See errors with crs 3.3.2 #833
Replies: 2 comments 4 replies
-
Hi @joshi-mohit, any CRS |
Beta Was this translation helpful? Give feedback.
-
In my application using CRS 4.0 RC1, running a very simple curl request to check SQL injection rules but see too many rules around 70 of them showing as part of MatchedRules -- Most of them are related to setting variables (e.g. setting paranoia levels or setting flags etc There any way to prevent such rules from showing up in matched_rules. One of the way I thought was checking the severity of the rule (Rule().Severity() as most of them variable setting rules won't have severity -- but then saw all the rules have severity as "emergency".. Any way to come out of this |
Beta Was this translation helpful? Give feedback.
-
failed to compile the directive "secauditlogrelevantstatus": error parsing regexp: invalid or unsupported Perl syntax:
(?!
Saw this (though not specific to 3.3.2)
SecAuditLogRelevantStatus "^(?:5|4(?!04))"
when moved to this, it works fine
SecAuditLogRelevantStatus "^(?:(5|4)(0|1)[0-9])$"
Getting some pocre errors from rules from Core Rule Set ver.3.3.2
Help needed here
a) Can I pick some some CRS rule set version which I can use directly ?
b)
Noticed similar problem on setting Paranoia level
failed to parse string: failed to compile the directive "secrule": invalid arguments, expected collection TX
SecRule TX:EXECUTING_PARANOIA_LEVEL "@lt 1" "id:913011,phase:1,pass,nolog,skipAfter:END-REQUEST-913-SCANNER-DETECTION"
SecRule TX:EXECUTING_PARANOIA_LEVEL "@lt 1" "id:913012,phase:2,pass,nolog,skipAfter:END-REQUEST-913-SCANNER-DETECTION"
c) other regex related parsing errors
Beta Was this translation helpful? Give feedback.
All reactions