![]() It happens when content analyzed by security rule with Perl regular expression is too complex or number of requests is too high. If you want to dig deeper: PCRE limits exceeded is common problem in high-load environment. If you don’t have Ruby on your server you can safe disable them. Well this rules targeting Ruby on Rails vulnerability (CVE 2013-0156) ![]() yaml.- !ruby/hash:ActionDispatch::Routing::RouteSet::NamedRouteCollection.\n. ![]() !ruby/object:ActionController::Routing::Route.\n\s segments.\n\s requirements.” yaml.- !ruby/hash:ActionController::Routing::RouteSet::NamedRouteCollection.\n. ModSecurity: Rule 7f799cdb2090 - Execution error - PCRE limits exceeded (-8): (null). ModSecurity: Rule 7f799cd13550 - Execution error - PCRE limits exceeded (-8): (null). Ubuntu 14.04 running Apache 2.4 with modsecurity 2.7.7 and latest cwaf rules. What could be the cause of this? Suggested fix other than disabling the rules or raising the pcre limit to some absurdly high value?
0 Comments
Leave a Reply. |