-
Notifications
You must be signed in to change notification settings - Fork 274
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Rework Pullrequest #122, avoid xss false positives starting with 'on.*' #143
base: master
Are you sure you want to change the base?
Conversation
As a CRS maintainer, I agree that a fix for this problem would be very interesting. Our users regularly turn up false positives due to generic SpiderLabs/owasp-modsecurity-crs#820 A discrete blacklist would solve this problem, although it may require more regular maintenance as new event handlers are added. |
Looks like there were some eventhandlers missing. Adding them now. |
build passed 🎉 |
Well :-) It's now sorted alphabetically. This makes it easier to add new event handlers. |
We are now successfully using this patch in production. While we were seeing 20-30 FP per day before, the rate has now dropped to 1-2 per day. One of the worst FP caused by this was 'online'. |
Is there anything holding this PR? It'd be great if it's merged. |
@client9 is this project abandoned? |
You may want to look here: libinjection/libinjection#7 we are giving o followup on that discussion there. |
It is safer to use a list of event handlers than just matching strings > 5 chars