Hi there,

ModSecurity – or any WAF for that matter – produces false positives. If
it does not produce false positives, then it’s probably dead. A strict
ruleset like the OWASP ModSecurity Core Rules brings a lot of false
positives and it takes some tuning to get to a reasonable level of
alerts. If you have tuned a few services, then some of the rules will
become familiar to you. But which ones are these rules?

I have assembled them in a blogpost at:
https://www.netnea.com/cms/2016/01/17/most-frequent-false-positives-triggered-by-owasp-modsecurity-core-rules-2-2-x/

Naturally, these rules are candidates to be moved to the said
paranoia mode.

Here are the most frequent "offenders" based on my experience (=
customer sites).

950901  SQL Injection Attack: SQL Tautology Detected.
959073  SQL Injection Attack
960015  Request Missing an Accept Header
960017  Host header is a numeric IP address
960024  Meta-Character Anomaly Detection Alert – Repetative Non-Word ...
981172  Restricted SQL Character Anomaly Detection Alert – Total # ...
981173  Restricted SQL Character Anomaly Detection Alert – Total # ...
981231  SQL Comment Sequence Detected
981243  Detects classic SQL injection probings 2/2
981248  Detects chained SQL injection attempts 1/2
981260  SQL Hex Encoding Identified

Comments welcome.

Have a good week, everybody!

Christian


-- 
You don't have to be great to start, but you have to 
start to be great. 
-- Zig Ziglar
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to