WAF: Exclude all cookies from managed rule group

0

Hi there,

I'd like to prevent cookies from triggering rules in the AWS-managed SQL Injection rule set. By default, the ruleset seems to scan query parameters, body, and cookies, but cookies regularly contain URL-encoded strings and semicolons that cause tons of false-positives. For example, this request is blocked:

curl -H 'cookie: id=%22test%22;' https://example.com

Is there a way to make the WAF ignore cookies?

I've tried setting the rule action for "SQLi_COOKIE" to "allow", but it didn't work, requests are still blocked.

Mac C
已提问 5 个月前280 查看次数
2 回答
0

I was able to workaround the issue by using the "custom response" logic described here: https://repost.aws/knowledge-center/waf-managed-rules

Instead of blocking requests tagged with any tag in the whole "namespace" of all SQL injection rules (awswaf:managed:aws:sql-database), I configured it to only match on the body (awswaf:managed:aws:sql-database:SQLi_Body).

But this is a hack since the cookies are still scanned for SQL injection. I'd like to avoid scanning cookies all together, like ModSecurity's UpdateTargetById

Mac C
已回答 5 个月前
0

To prevent cookies from triggering rules in the AWS-managed SQL Injection rule set:

Identify the SQLi_COOKIE rule that is blocking requests containing cookies.

Edit the rule and set the action to ALLOW for that specific rule.

Save the changes to the rule group.

Setting the action to ALLOW for just the SQLi_COOKIE rule should allow requests containing cookies to pass, while still blocking for other rules like SQLi_BODY or SQLi_HEADER.

profile picture
专家
已回答 1 个月前

您未登录。 登录 发布回答。

一个好的回答可以清楚地解答问题和提供建设性反馈,并能促进提问者的职业发展。

回答问题的准则