> The rule id without the parameter triggering and the value
> of the parameter does not do you any good. You need the
> audit-log or at least the apache error-log to be able to
> tune it. If that is not possible, then
> the apache error-log can take you very far as well.

They didn't give me that unfortunately. For one custom web-app I run I
was able to trace the error down to a specific section of the backend
code, which got me within the specific module. No idea why the
security triggered as the module is very basic, just takes some input,
does a sanity check on the input, sanitizes for mySQL injections, then
updates a database entry. mediawiki (black box that it is) did exactly
the same sort of thing.

What got me curious was that from the end user perspective, if you
wrote, for example, the simple basic text (minus quotes): "The Grey
fox jumped over the brown cow." it would trigger modsecurity. However,
if you changed Grey to Gray or fox to dog, it wouldn't trigger. So why
a simple word change allowed the exact same text to go through I have
no idea. In this particular instance I ended up bisecting the
paragraph being entered to discover it was a simple choice of words
causing the error.

*shrugs* Go Figure. :-)


-- 
Drew

"Nothing in life is to be feared. It is only to be understood."
--Marie Curie

"This started out as a hobby and spun horribly out of control."
-Unknown
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to