On Tue, Aug 6, 2013 at 10:44 PM, Ben WIlliams < benwilliams+ow...@joobworld.com> wrote:
> A textarea input is triggering an inbound anomaly score of 26 due to > newline chars - \x0d\x0a\x0d\x0a > > All the rules triggered are SQLi rules except for one (960024). Would this > be the best workaround? > > SecRuleUpdateTargetByTag "WEB_ATTACK/SQL_INJECTION" "!ARGS:input_11" > SecRuleUpdateTargetById 960024 "!ARGS:input_11" > > Hi Ben, That looks good. Just make sure to include those rules after the other rules are created, e.g. in the 48 file. -- - Josh _______________________________________________ > Owasp-modsecurity-core-rule-set mailing list > Owasp-modsecurity-core-rule-set@lists.owasp.org > https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set > >
_______________________________________________ Owasp-modsecurity-core-rule-set mailing list Owasp-modsecurity-core-rule-set@lists.owasp.org https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set