-
Notifications
You must be signed in to change notification settings - Fork 1.7k
About SecRequestBodyAccess Off and SecResponseBodyAccess Off #1531
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
It would depend on the remaining defensive rules that are enabled. If the other rules are for example looking for matches on Phase Request Headers (query string, cookies and other headers) it will work fine. If you look at the description for SecRequestBodyAccess on the reference manual you will see the following: "This directive is required if you want to inspect the data transported request bodies (e.g., POST parameters). Request buffering is also required in order to make reliable blocking possible." Meaning that variables like ARGS_POST, REQUEST_BODY and STREAM_INPUT_BODY will be empty and you wont be able to match on them. See also Phase Request Body. The same concept applies to SecResponseBodyAccess. |
@victorhora @zimmerle seems like this one is still working incorrectly with libmodsecurity: |
#1886 should fix this. Please confirm if it works for you ;) |
See the following issues for details: owasp-modsecurity/ModSecurity#1531 owasp-modsecurity/ModSecurity#1886
Merged! Thanks! |
See the following issues for details: owasp-modsecurity/ModSecurity#1531 owasp-modsecurity/ModSecurity#1886
See the following issues for details: owasp-modsecurity/ModSecurity#1531 owasp-modsecurity/ModSecurity#1886
If SecRequestBodyAccess Off and SecResponseBodyAccess Off are set ,then the other defensive rules will have a defensive effect ? thank u
The text was updated successfully, but these errors were encountered: