Hi,

Thank you,

Finally I use this:

SecRuleUpdateTargetById 981245 !ARGS:/^SubmitCercle

And I add the parameter in:

SecRule REQUEST_COOKIES|!REQUEST_COOKIES
:/__utm/|!REQUEST_COOKIES:/_pk_ref/|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML|!
ARGS:/message/|!ARGS:/left/|!ARGS:/right/:/*
"(?i:(?:.*?[)\da-f\"'`´’‘][\"'`´’‘](?\

:[\"'`´’‘].*?[\"'`´’‘]|\Z|[^\"'`´’‘]+))|(?:\Wselect.+\W*?from)|((?:select|create|rename|truncate|load|alter|delete|update|insert|desc)\s*?\(\s*?space\s*?\())"
"phase:2,capture,t:none,t:urlDecodeUni,blo\

ck,msg:'Detects MySQL comment-/space-obfuscated injections and backtick
termination',id:'981257',tag:'OWASP_CRS/WEB_ATTACK/SQL_INJECTION',logdata:'Matched
Data: %{TX.0} found within %{MATCHED_VAR_NAME}\

: %{MATCHED_VAR}',severity:'2',setvar:'tx.msg=%{rule.id
}-%{rule.msg}',setvar:tx.sql_injection_score=+1,setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},setvar:'tx.%{tx.msg}-OWASP_CRS/WEB_ATTACK/SQ
\


Thank you :)

2015-12-28 21:24 GMT+00:00 Chaim Sanders <csand...@trustwave.com>:

> This is probably the opposite of what you want to do.
> Not only does it not work with your link because of the extra slash (it is
> a dollar sign in your link) but this will turn off ALL the rules for any
> request that contains that keyword anywhere in it.
>
> Take a look at this post:
> https://www.trustwave.com/Resources/SpiderLabs-Blog/ModSecurity-Advanced-Topic-of-the-Week--(Updated)-Exception-Handling/
> To get a better idea of what you should be doing :). If you are confused
> by the post reach back out and I’ll work with you some more.
>
> From: Ilyass Kaouam <ilyassi...@gmail.com>
> Reply-To: "ilyassi...@gmail.com" <ilyassi...@gmail.com>
> Date: Monday, December 28, 2015 at 5:05 AM
> To: Chaim Sanders <csand...@trustwave.com>
> Cc: "owasp-modsecurity-core-rule-set@lists.owasp.org" <
> owasp-modsecurity-core-rule-set@lists.owasp.org>
> Subject: Re: [Owasp-modsecurity-core-rule-set] Exclude a request
>
> Hi Chaim,
>
> Thank you for you reply,
>
> SecRule REQUEST_URI "^/SubmitCercle"
> id:1,t:none,t:lowercase,nolog,phase:1,allow,ctl:ruleEngine=Off,ctl:auditEngine=Off
>
> You would like say like this ?
>
> Thank you
>
>
>
> 2015-12-23 18:25 GMT+00:00 Chaim Sanders <csand...@trustwave.com>:
>
>> The ideal way to do this with OWASP crs is to exclude that variable from
>> being inspected by the given rule. This can be done by using the
>> secupdatetargetbyid directive. To this directive you may pass ! Action and
>> also the id of the rule causing the issue. For an example please see the
>> modsecurity reference manual.
>> When not using OWASP you would probably add chained portions to the rule
>> to exclude it from firing whenever the request URL and parameters were
>> present. Doing this with OWASP will cause issues with updates potentially.
>> On Dec 23, 2015 11:41 AM, Ilyass Kaouam <ilyassi...@gmail.com> wrote:
>>
>> Hi,
>>
>> Hello,
>>
>> I have a question please
>>
>> I have a text field in which the user enters a message, the WAF blocks
>> this request
>> here is the url:
>>
>> POST / servlet / EspaceClientServlet?Action=Ajax$SubmitCercle
>>
>> I want to exclude this request that is to say to waf do not filter
>> queries with "POST / servlet/EspaceClientServlet?Action=Ajax$SubmitCercle"
>>
>> Can you please tell me how?
>>
>> Thank you
>>
>> --
>> *Ilyass kaouam*
>> *Systems administrator*
>> * at Inforisk Group Finaccess  *
>>
>>
>> ------------------------------
>>
>> This transmission may contain information that is privileged,
>> confidential, and/or exempt from disclosure under applicable law. If you
>> are not the intended recipient, you are hereby notified that any
>> disclosure, copying, distribution, or use of the information contained
>> herein (including any reliance thereon) is strictly prohibited. If you
>> received this transmission in error, please immediately contact the sender
>> and destroy the material in its entirety, whether in electronic or hard
>> copy format.
>>
>
>
>
> --
> *Ilyass kaouam*
> *Systems administrator*
> * at Inforisk Group Finaccess *
>
> ------------------------------
>
> This transmission may contain information that is privileged,
> confidential, and/or exempt from disclosure under applicable law. If you
> are not the intended recipient, you are hereby notified that any
> disclosure, copying, distribution, or use of the information contained
> herein (including any reliance thereon) is strictly prohibited. If you
> received this transmission in error, please immediately contact the sender
> and destroy the material in its entirety, whether in electronic or hard
> copy format.
>



-- 
*Ilyass kaouam*
*Systems administrator*
* at Inforisk Group Finaccess *
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to