Wouldn't that bypass all future rules from scanning that same HTTP
transactions?

On Fri, Jun 12, 2015 at 9:44 AM Chaim Sanders <csand...@trustwave.com>
wrote:

>  You could use the ‘ctl’ action to disable the engine after a certain
> rule triggers, thereby skipping the rest of the checks. You could also
> place this in a virtual host area if needed.
>
>
>
> SecRule REQUEST_URI "@contains /encryptedbit/" "phase:1,t:none,pass,
> nolog,ctl:ruleEngine=Off”
>
>
>
> *Chaim Sanders    *
>
> Security Researcher, SpiderLabs
>
>
>
> *Trustwave* | SMART SECURITY ON DEMAND
>
> www.trustwave.com
>
>
>
> *From:* owasp-modsecurity-core-rule-set-boun...@lists.owasp.org [mailto:
> owasp-modsecurity-core-rule-set-boun...@lists.owasp.org] *On Behalf Of *Joshua
> Roback
> *Sent:* Friday, June 12, 2015 9:16 AM
> *To:* owasp-modsecurity-core-rule-set@lists.owasp.org
> *Subject:* [Owasp-modsecurity-core-rule-set] Ignore URI From Scanning
>
>
>
> Hello Group,
>
> I'm come across an issue in which I'll be using ModSecurity to protect a
> site with an encrypted URI.  For the sake of reducing false positives, what
> would be the most effective way to omit the URI from scanning but continue
> to scan other HTTP header fields and all payloads?
>
> ------------------------------
>
> This transmission may contain information that is privileged,
> confidential, and/or exempt from disclosure under applicable law. If you
> are not the intended recipient, you are hereby notified that any
> disclosure, copying, distribution, or use of the information contained
> herein (including any reliance thereon) is strictly prohibited. If you
> received this transmission in error, please immediately contact the sender
> and destroy the material in its entirety, whether in electronic or hard
> copy format.
>
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to