Hi,
I would like a little help if possible writing an exception for what
is being tagged as a SQL Injection attempt.

here is the audit log data:
[Wed Aug 13 16:58:59 2014] [error] [client aaa.bbb.ccc.ddd]
ModSecurity: Access denied with code 403 (phase 2). Pattern match
"\\\\b(\\\\d+)
 ?(?:=|<>|<=>|<|>|!=)
?\\\\1\\\\b|[\\\\'\\"\\\\`\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98](\\\\d+)[\\\\'\\"\\\\`\\\\\\xc2\\x
b4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98] ?(?:=|<>|<=>|<|>|!=)
?[\\\\'\\"\\\\`\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98]\\\\
2\\\\b|[\\\\'\\"\\\\`\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x98 ..." at
ARGS:position[e_statement]. [file "/usr/share/modsecurity-crs/activate
d_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "435"]
[id "950901"] [rev "2.2.0"] [msg "SQL Injection Attack"] [data " a
nd 60"] [severity "CRITICAL"] [hostname "test.example.com"] [uri
"/api/search/posit/509"] [unique_id "U@uZUwoAZa
IAAEDBdrsAAAAG"]

The text in a PUT validated by the web app contains a statement about
some regulations all URL encoded:

The string it is objecting to is in the PUT body here:
CFR+%26sect%3B%26sect%3B+60-1.4(a)%2C+60-300.5(a)+and+60-741.5(a).

My current rule is:
SecRule REQUEST_LINE "PUT /api/search/posit/\d{3}"
"chain,phase:2,t:none,t:compressWhiteSpace,nolog,pass"
        SecRule ARGS|REQUEST_BODY "@streq and60"
"nolog,ctl:ruleRemoveById=905901"
Any ideas? please?
Thanks Dan

-- 
--
d...@madjic.net
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to