Dauto,

As you know, this is part of the optional rules collection and this
means it is less used and less tested then the other core rules.

Personally, I have not used this ruleset, so I am not really sure it
works as advertised.

A few questions, I would try to answer if I was debugging this?
- Is the 16 session hijacking ruleset enabled?
- Are you sure it is executed before the 43 csrf file (I guess it is)
- Is the session collection active at the moment 981144 is exctivated?
- Do you see any values in the session collection?
- Can you write and read from the session collection?

Ahoj,

Christian

On Thu, May 12, 2016 at 12:08:47AM +0200, Dauto Jeichande wrote:
> Dear all,
> I´m testing the modsecurity_crs_43_csrf_protection.conf. I can see that the 
> requests to the application contains the CSRF Token. However in the error.log 
> I'm having the following warning when browsing the application:
>  ModSecurity: Warning. Match of "streq %{SESSION.CSRF_TOKEN}" against 
> "ARGS:CSRF_TOKEN" required. [file 
> "/usr/local/apache/conf/crs/activated_rules/modsecurity_crs_43_csrf_protection.conf"]
>  [line "34"] [id "981144"] [msg "CSRF Attack Detected - Invalid Token."] 
> [hostname "xxxxx"] [uri "xxxxxx"] [unique_id "xxxxxxxxxxxxxx"]
> What should  I do to fix this warning.
> Thanks,
> Dauto                                           
> 
> -                                                                             
>   

> _______________________________________________
> Owasp-modsecurity-core-rule-set mailing list
> Owasp-modsecurity-core-rule-set@lists.owasp.org
> https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set


-- 
mailto:christian.fol...@netnea.com
http://www.christian-folini.ch
twitter: @ChrFolini
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to