Hey gang,

I know this isn't a CRS issue per se, but I thought you might have some insight 
before I either dig through the mod_security code or ask them how I should do 
this.

Our application occasionally wants to accept stuff that looks scary, like HTML, 
from certain form submissions. After some thought, I figured the best way to do 
this was to make a small change to the application to put "html" in the 
parameter name, and then use ctl:secRemoveTargetById to whitelist those rules 
on the way through the CRS rule set.

Here's what I tried first, for one particular rule 973333:
SecRule REQUEST_URI "." 
id:1000200,phase:2,pass,ctl:ruleRemoveTargetById=973333;ARGS:/[Hh]tml/

But it doesn't seem to work. Everything is being treated as normal.

I've used that REQUEST_URI-matching-anything idiom in other rules, so I don't 
think that is failing to match. My intention is to remove 973333 for only those 
arguments that match the regex. Anyone have any suggestions for me, or attempt 
something similar? If I can get this rule working, I'd then expect to have 
additional rules removing other targets that look basically the same.

Thanks in advance --

-m
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to