This is the match I get:
against variable `ARGS:json' (Value: `{"j_username": "username", "j_password": "password_with_special_marks", "remember_me": false, "from": (4 characters omitted)' ) [file "/usr/local/nginx/conf/rules/REQUEST-942-APPLICATION-ATTACK-SQLI.conf"] [line "509"] [id "942130"]
The password has special marks and it flags it as SQL injection.
I tried whitelisting the rule with both:
SecRuleUpdateTargetById 942130 !ARGS:'j_password'
SecRuleUpdateTargetById 942130 !ARGS:'json'
Neither of them worked. The question is what argument should I take from the match ARGS?
You should match ARGS:json. There are a couple of things to consider here.
Good luck!