The ideal way to do this with OWASP crs is to exclude that variable from being 
inspected by the given rule. This can be done by using the secupdatetargetbyid 
directive. To this directive you may pass ! Action and also the id of the rule 
causing the issue. For an example please see the modsecurity reference manual.
When not using OWASP you would probably add chained portions to the rule to 
exclude it from firing whenever the request URL and parameters were present. 
Doing this with OWASP will cause issues with updates potentially.

On Dec 23, 2015 11:41 AM, Ilyass Kaouam <ilyassi...@gmail.com> wrote:
Hi,

Hello,

I have a question please

I have a text field in which the user enters a message, the WAF blocks this 
request
here is the url:

POST / servlet / EspaceClientServlet?Action=Ajax$SubmitCercle

I want to exclude this request that is to say to waf do not filter queries with 
"POST / servlet/EspaceClientServlet?Action=Ajax$SubmitCercle"

Can you please tell me how?

Thank you

--
Ilyass kaouam
Systems administrator at Inforisk Group Finaccess


________________________________

This transmission may contain information that is privileged, confidential, 
and/or exempt from disclosure under applicable law. If you are not the intended 
recipient, you are hereby notified that any disclosure, copying, distribution, 
or use of the information contained herein (including any reliance thereon) is 
strictly prohibited. If you received this transmission in error, please 
immediately contact the sender and destroy the material in its entirety, 
whether in electronic or hard copy format.
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to