If there is a check for a Cookie there would be no chance to exclude
static resources for sites which require authentication?

Michael


2012/2/15 Ryan Barnett <rbarn...@trustwave.com>:
> One potential bypass issue - Cookies. This was an issue in the SQL injection 
> challenge.
>
> I guess we could add a check to make sure there are no cookies either. If so, 
> we should run the request through normal inspection.
>
> Ryan
>
> On Feb 15, 2012, at 5:25 PM, "Ryan Barnett" 
> <rbarn...@trustwave.com<mailto:rbarn...@trustwave.com>> wrote:
>
> I would like to update the logic of the this ruleset -
> http://mod-security.svn.sourceforge.net/viewvc/mod-security/crs/trunk/optional_rules/modsecurity_crs_10_ignore_static.conf
>
> The concept is that rather than audit log all transactions (with SecAuditLog 
> On), you want to exclude logging requests for static resources.  The trick is 
> that we need to try and ensure that the attack surface is significantly 
> reduced.  In order to do that, I am testing this updated ruleset -
>
> SecRule REQUEST_METHOD "@pm GET HEAD" 
> "id:'999001',chain,phase:1,t:none,nolog,pass"
>        SecRule REQUEST_URI "!@contains ?" "chain"
>                SecRule &ARGS "@eq 0" "chain"
>                        SecRule 
> &REQUEST_HEADERS:Content-Length|&REQUEST_HEADERS:Content-Type "@eq 0" 
> "ctl:ruleEngine=Off,ctl:auditEngine=Off"
>
> This rule checks the following -
>
>  1.  That the request method is either a GET or HEAD.  If it is anything 
> else, they it should probably be logged as it is a dynamic request method 
> looking to alter data.
>  2.  Verifies that there is no query string by checking for ? Char in the URI.
>  3.  Verifies that there are no ARGS being passed
>  4.  Verifies that there is no request body by checking for the existence of 
> Content-Length and Content-Type request headers.
>
> If all of these rules match, then the ctl actions are used to toggle off both 
> the audit and rule engines.
>
> Does anyone have any feedback on this updated ruleset?  Any improvements?
>
> Thanks.
>
> --
> Ryan Barnett
> Trustwave SpiderLabs
> ModSecurity Project Leader
> OWASP ModSecurity CRS Project Leader
>
> ________________________________
> This transmission may contain information that is privileged, confidential, 
> and/or exempt from disclosure under applicable law. If you are not the 
> intended recipient, you are hereby notified that any disclosure, copying, 
> distribution, or use of the information contained herein (including any 
> reliance thereon) is STRICTLY PROHIBITED. If you received this transmission 
> in error, please immediately contact the sender and destroy the material in 
> its entirety, whether in electronic or hard copy format.
> _______________________________________________
> Owasp-modsecurity-core-rule-set mailing list
> Owasp-modsecurity-core-rule-set@lists.owasp.org
> https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to