Josh,

> Editing the CRS rules directly is not recommended as it makes upgrading
> the rules much harder. Furthermore, its probably a good idea to upgrade
> ModSecurity to the latest version as there was recently a DoS related
> vulnerability patched. Once you are running a more recent version, your
> options for handling false positives becomes significantly more flexible as
> well, see:
>
> http://blog.spiderlabs.com/2011/08/modsecurity-advanced-topic-of-the-week-exception-handling.html
>
>
I know that using the latest version is better, but I have some practical
difficulties to upgrade at the moment. Will do that only after 6 months.


> On ModSec 2.5.12, you can simply white-list the offending rule/s by
> including something like the following *before* you include the offending
> CRS rules.
>
> <Location /iredadmin/login>
>   SecRuleRemoveById 960010
> </Location>
>
>
This solution is fine for me. I gave this in apache.conf as follows. But it
is not working (still forbidden).

Is it Location or LocationMatch ? Thanks.


<IfModule security2_module>
          <Location /iredadmin/login/>
            SecRuleRemoveById 960010
          </Location>

          Include modsecurity_crs/modsecurity_crs_10_setup.conf
          Include modsecurity_crs/activated_rules/*.conf

</IfModule>
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to