Skip to content

Commit ae128ad

Browse files
committed
Having the Sec[Request|Response]BodyAccess deprecated
1 parent 62d35fb commit ae128ad

File tree

6 files changed

+928
-780
lines changed

6 files changed

+928
-780
lines changed

modsecurity.conf-recommended

+13-2
Original file line numberDiff line numberDiff line change
@@ -9,11 +9,16 @@ SecRuleEngine DetectionOnly
99

1010
# -- Request body handling ---------------------------------------------------
1111

12+
#
1213
# Allow ModSecurity to access request bodies. If you don't, ModSecurity
1314
# won't be able to see any POST parameters, which opens a large security
1415
# hole for attackers to exploit.
1516
#
16-
SecRequestBodyAccess On
17+
# IMPORTANT: SecRequestBodyAccess is no longer supported. The Request Body
18+
# will be processed whenever a variable depends on it.
19+
#
20+
# SecRequestBodyAccess On
21+
#
1722

1823

1924
# Enable XML request body parser.
@@ -146,7 +151,13 @@ SecRule TX:/^MSC_/ "!@streq 0" \
146151
# Do keep in mind that enabling this directive does increases both
147152
# memory consumption and response latency.
148153
#
149-
SecResponseBodyAccess On
154+
# IMPORTANT: SecResponseBodyAccess is no longer supported. The Response Body
155+
# will be processed whenever a variable depends on it.
156+
#
157+
# SecResponseBodyAccess On
158+
#
159+
#
160+
150161

151162
# Which response MIME types do you want to inspect? You should adjust the
152163
# configuration below to catch documents but avoid static files

0 commit comments

Comments
 (0)