-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Response rules are running with 'SecResponseBodyAccess Off' #2549
Comments
Hi @noloader, According to the log message you have OWASP CRS enabled. The OWASP CRS is asking ModSecurity to block the request. It is likely that you have a second |
Related to #2465 |
Thanks @zimmerle, It looks like
|
@noloader there is no correlation: The rules will be evaluated always (if there is no any exception), you can't control it with this directive - and this is the normal behavior. The referenced issue (2465) describes a wrong behavior in case of modsecurity3. Based on the attached log: looks like the triggered rule is the 980130. This rules checks the INBOUND_ANOMALY_SCORE. This score incremented in phases 1 and 2, while the engine analyzes the request, not the response. Check your log, you will find all triggered rules, and you can make few exceptions to avoid this behavior. Perhaps this is a CRS issue, not ModSecurity. |
Thanks @airween, So I'm not sure what to do now. We installed and enabled ModSecurity, and we started having problems serving pages. We tried to turn off outbound scanning because our pages are static and trusted. The pages are still being scanned. At this point we've disabled ModSecurity. We can't have it DoS'ing our site. Do you have any other suggestions? |
Please close this issue, and open a new one here. Please fill the issue template carefully: share all relevant info, but don't forget to anonymize it. You can set the engine to detect the attacks but don't block them with |
I help maintain the Crypto++ library. Our online manual is at https://www.cryptopp.com/docs/ref/. ModSecurity is blocking some of the pages served from the manual, like the documentation for our Base64 classes. The Base64 decoder docs are at https://www.cryptopp.com/docs/ref/class_base64_decoder.html.
We turned off response scanning with
SecResponseBodyAccess Off
, but response rules are still running and blocking the manual pages.My apologies if I misunderstand how to disable outbound scanning. We consider our static pages as trusted, so they don't need scanning when served to a client.
Logs and dumps
With
ModSecEngine On
andSecResponseBodyAccess Off
, I get an access denied for the Base64 decoder documentation. Ourerror.log
has the following entry. Notice the response ruleRESPONSE-980-CORRELATION
is running and blocking the documentation page.To Reproduce
Navigate to https://www.cryptopp.com/docs/ref/class_base64_decoder.html.
Expected behavior
Unimpaired access to the web page.
Here's a copy of the page from the Wayback machine: https://web.archive.org/web/20160821004853/https://www.cryptopp.com/docs/ref/class_base64_decoder.html.
Server:
Ubuntu 20.04, x86_64, fully patched:
ModSecurity version:
Webserver version:
Rule Set:
No public or commercial rule sets. Just the stuff that Ubuntu 20 provides, which is the default ModSecurity gear.
Additional context
None.
The text was updated successfully, but these errors were encountered: