10000 HTTP header injection: move ARGS_GET check to PL2 to mitigate FP · Issue #633 · coreruleset/coreruleset · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

HTTP header injection: move ARGS_GET check to PL2 to mitigate FP #633

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
CRS-migration-bot opened this issue May 13, 2020 · 0 comments
Closed

Comments

@CRS-migration-bot
Copy link

Issue for tracking original pull request created by user lifeforms on date 2016-10-31 12:29:38.
Link to original PR: SpiderLabs/owasp-modsecurity-crs#633.

HEAD is: 3908f9d
BASE is: 18020a8
Resolves #623 false positives when a newline is used in GET parameter value.

I've been experimented a bit with XSS this week and consider this check more useful than I did originally. So especially since I'm the only one who complained about this FP, I am going for a compromise and move it to PL2 instead of my proposal of PL3.

Super-complex query parameters and free-form GET forms should be sufficiently rare nowadays that my impression is that PL2 users will be able to handle the FP. If it turns out to still be a dog, we can change it in a later release.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant
0