In anomaly scoring mode, CRS 2.2.8 no longer blocks based only on 
tx.anomaly_score
exceeding the tx.inbound_anomaly_score_level.

Example:

- This rule worked on some previous CRS version. But, in 2.2.8, it does not 
block based on tx.anomaly_score:
SecRule REQUEST_URI "^/local/modsec/test$" "id:'10999',auditlog,block,msg:'LOCAL: 
modsec test',setvar:'tx.msg=%{rule.msg}',setvar:tx.anomaly_score=+%{tx.critical_anomaly_score}"

- Appending setvar:'tx.%{rule.id}-local-modsec-test=bad' to the above rule 
"fixes" that:
SecRule REQUEST_URI "^/local/modsec/test$" "id:'10999',auditlog,block,msg:'LOCAL: 
modsec 
test',setvar:'tx.msg=%{rule.msg}',setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},setvar:'tx.%{rule.id}-local-modsec-test=bad'"


Here was the mod that changed the behavior to 
base_rules/modsecurity_crs_49_inbound_blocking.conf:
https://github.com/SpiderLabs/owasp-modsecurity-crs/commit/b054a4d92a00812b031facb3f81dd70e728ae8b3

So, is the fact that CRS 2.2.8 now longer really blocks based only on tx.anomaly_score an unintended consequence ?

-RP
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to