On 30.09.2014 10:51, Baptiste wrote:
> On Mon, Sep 29, 2014 at 2:36 PM, Thomas Heil
> <[email protected]> wrote:
>> Hi,
>>
>> To mitigate the shellshock attack we added two lines in our frontends.
>>
>> --
>> frontend fe_80
>> --
>>         reqideny  ^[^:]+:\s*\(\s*\)
>>         reqideny  ^[^:]+:\s+.*?(<<[^<]+){5,}
>> --
>>
>> and checked this via
>>
>> --
>>  curl --referer "x() { :; }; ping 127.0.0.1" http://my-haproxy-url/
>>  curl --referer "true <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF
>> <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF" http://my-haproxy-url/
>> --
>>
>> Any hints or further sugestions?
>>
>> cheers
>> thomas
>>
>>
>>
> 
> Hi Thomas,
> 
> Thanks for the tips.
> I blogged it with some differences:
> http://blog.haproxy.com/2014/09/30/mitigating-the-shellshock-vulnerability-with-haproxy/

Maybe you should add a warning that this may not catch all possible
exploits of that bash bug. The parser seems to be quite bad and even
after 2 rounds of security releases from vendors the exploit in bash
still isn't fixed all the way. The above fixes *some* of the attack
vectors but there may be others that bypass this.

Regards,
  Dennis

Reply via email to