Hi,

I am also annoyed by this bug in the CRS and suprised nobody responded
to the two messages explaining the bug.

Is it plan to integrate this in 2.2.7? Or is there a need for a GitHub
pull request (even for such a trivial fix)?

If this is not fixed upstream, some users (including me) might need to
backport this manually, this is really annoying.

Many thanks in advance,


Damien

> Hi Ryan, are you planning to add this little fix to the 2.2.7? That would 
> really be great!

> Thank you!

> On Friday, November 9, 2012, rm4dillo D wrote:
> Hi,

> The "base_rules/modsecurity_crs_41_xss_attacks.conf" rules file starts with a 
> smart rule that checks the presence of some keywords (Ex. script 
> javascript...) and depending on the result, it decides to run deeper rules or 
> just skip them. The problem is that the conditional "skip" never works 
> because it tests the "pm_xss_score" variable which is not initialized.

>     SecRule TX:PM_XSS_SCORE "@eq 0" 
> "phase:2,id:'981018',t:none,pass,skipAfter:END_XSS_CHECK,nolog"

> To fix this, I just directive this at the beginning of the file:

>     SecAction "phase:2,rev:'2.2.5',t:none,pass,nolog,setvar:tx.pm_xss_score=0"

> It would be nice to fix this in the next core rule set release.
> Thank you in advance.
> Rm4dillo
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to