Hello @Ashish Gupta , As Web Application Firewall utilizes Open Web Application Security Project (OWASP) rules to grant protection against many common attack categories, including SQL Injection, Cross Site Scripting, Local File Inclusion, etc. This is an open-source project.
The Methodology here is to.
- Identify the rule which is blocking this issue: You can identify this via OWASP GitHub Repo where the
details.file
represents the file anddetails.line
will represent the rule section which was triggered. For example 1 above this rule was triggered. You can also have a look at the severity of this rule. - Check if it is possible to modify the application so that this rule is not hit.
- If it is not possible to modify the application, check if you can disable the rule which was hit based on your application behavior and set-up or it is possible to add an exclusion rule.
- If adding exclusion rule is not possible check if you can add a custom rule instead. Just be aware that custom rule has more priority than the Managed rules above and is evaluated first.
If you are trying to add an exclusion list as mentioned in the documentation you referred above. The following attributes can only be added to exclusion lists by name. The values of the chosen field aren't evaluated against WAF rules.
- Request Headers
- Request Cookies
- Request attribute name (args)
As per my understanding in the example 1 above you can add Request Cookie "CSRF-TOKEN" in the exclusion list so that its value is not evaluated by WAF. It is recommended to test the Exclusion List in detection mode to validate if the requests are not blocked.
Hope this helps! Please let me know if you have any additional questions. I will be glad to continue with our discussion. Thank you!