-
Notifications
You must be signed in to change notification settings - Fork 292
RESPONSE_BODY variable is unfilled #8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
zimmerle
added a commit
that referenced
this issue
Mar 17, 2016
This commit fix the issue #8. This patch needs to be polished, it is only necessary if the SecResponseBody is enabled.
dennus
pushed a commit
to dennus/ModSecurity-nginx
that referenced
this issue
Apr 23, 2018
…rity from fix/try_to_fix_core_dump to develop * commit '7f0eb0455125a4c662e37534bb87176bf02282f5': Try to fix core dumps
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
It seems that
ngx_http_modsecurity_body_filter.c
makes some assumptions about thengx_chain_t
struct passed tongx_http_modsecurity_body_filter
. Examine the following:Given the following nginx 1.8.1 build:
And given the following inline modsecurity config: https://gist.github.com/p0pr0ck5/3864f5f18ae5ba5cb7aa
Given this diff for debug purposes - https://gist.github.com/p0pr0ck5/a24b2f8f8cd00997df41 -
Given a request to
localhost/index.html
(which will read the file from disk) we will find ourselves stepping through to here:We will see the following in the error log:
Examining the chain:
Okay, we have a single buffer. The buffers contents:
So there is no buffer to pass to
msc_append_response_body
since the contents come from disk.The text was updated successfully, but these errors were encountered: