[ 
https://www.modsecurity.org/tracker/browse/CORERULES-77?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ryan Barnett resolved CORERULES-77.
-----------------------------------

    Resolution: Fixed

Provided an exception example for SVN traffic.

> Modsecurity creates fall positives when used with SVN-over-HTTP
> ---------------------------------------------------------------
>
>                 Key: CORERULES-77
>                 URL: https://www.modsecurity.org/tracker/browse/CORERULES-77
>             Project: Core Rules
>          Issue Type: Bug
>      Security Level: Normal
>          Components: False positive
>         Environment: Fedora 16 (updated) on x86_64 hardware.
>            Reporter: Philip Prindeville
>            Assignee: Ryan Barnett
>
> Seeing the following:
> --99fa9461-A--
> [05/Sep/2011:11:23:29 --0600] TmUFkcCoAQoAABnnJF8AAAAD ::1 52681 ::1 80
> --99fa9461-B--
> PROPFIND /svn/astlinux/trunk/package/linux-atm HTTP/1.1
> User-Agent: SVN/1.6.17 (r1128011) neon/0.29.5
> Connection: TE
> TE: trailers
> Host: localhost
> Content-Type: text/xml
> Accept-Encoding: gzip, gzip
> Depth: 0
> DAV: http://subversion.tigris.org/xmlns/dav/svn/depth, 
> http://subversion.tigris.org/xmlns/dav/svn/mergeinfo, 
> http://subversion.tigris.org/xmlns/dav/svn/log-revprops
> Content-Length: 300
> --99fa9461-C--
> <?xml version="1.0" encoding="utf-8"?><propfind 
> xmlns="DAV:"><prop><version-controlled-configuration 
> xmlns="DAV:"/><resourcetype xmlns="DAV:"/><baseline-relative-path 
> xmlns="http://subversion.tigris.org/xmlns/dav/"/><repository-uuid 
> xmlns="http://subversion.tigris.org/xmlns/dav/"/></prop></propfind>
> --99fa9461-F--
> HTTP/1.1 207 Multi-Status
> Content-Length: 730
> Connection: close
> Content-Type: text/xml; charset="utf-8"
> --99fa9461-H--
> Message: Match of "rx ^OPTIONS$" against "REQUEST_METHOD" required. [file 
> "/etc/httpd/modsecurity.d/base_rules/modsecurity_crs_21_protocol_anomalies.conf"]
>  [line "46"] [id "960015"] [rev "2.0.5"] [msg "Request Missing an Accept 
> Header"] [severity "CRITICAL"] [tag "PROTOCOL_VIOLATION/MISSING_HEADER"] [tag 
> "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"]
> Message: Match of "within %{tx.allowed_methods}" against "REQUEST_METHOD" 
> required. [file 
> "/etc/httpd/modsecurity.d/base_rules/modsecurity_crs_30_http_policy.conf"] 
> [line "30"] [id "960032"] [msg "Method is not allowed by policy"] [data 
> "PROPFIND"] [severity "CRITICAL"] [tag "POLICY/METHOD_NOT_ALLOWED"] [tag 
> "WASCTC/WASC-15"] [tag "OWASP_TOP_10/A6"] [tag "OWASP_AppSensor/RE1"] [tag 
> "PCI/12.1"]
> Message: Warning. Operator LT matched 20 at TX:inbound_anomaly_score. [file 
> "/etc/httpd/modsecurity.d/base_rules/modsecurity_crs_60_correlation.conf"] 
> [line "31"] [msg "Inbound Anomaly Score (Total Inbound Score: 15, SQLi=, 
> XSS=): Method is not allowed by policy"]
> Apache-Handler: dav-handler
> Stopwatch: 1315243409177653 15221 (1631* 4042 -)
> Producer: ModSecurity for Apache/2.5.12 (http://www.modsecurity.org/); core 
> ruleset/2.0.5.
> Server: Apache/2.2.19 (Fedora)
> --99fa9461-Z--
> --99fa9461-A--
> [05/Sep/2011:11:23:29 --0600] TmUFkcCoAQoAABnlI-4AAAAB ::1 52683 ::1 80
> --99fa9461-B--
> MKACTIVITY /svn/astlinux/!svn/act/709637a8-16ca-40eb-8008-8cb9d5bd189c 
> HTTP/1.1
> User-Agent: SVN/1.6.17 (r1128011) neon/0.29.5
> Connection: TE
> TE: trailers
> Host: localhost
> Accept-Encoding: gzip, gzip
> DAV: http://subversion.tigris.org/xmlns/dav/svn/depth, 
> http://subversion.tigris.org/xmlns/dav/svn/mergeinfo, 
> http://subversion.tigris.org/xmlns/dav/svn/log-revprops
> Content-Length: 0
> Authorization: Digest username="philipp", realm="Subversion repository", 
> nonce="+5sy+DSsBAA=d9c09363220f392546430d28d12b6348d29b7276", 
> uri="/svn/astlinux/!svn/act/709637a8-16ca-40eb-8008-8cb9d5bd189c", 
> response="e2528cc38f97a310abcb6a0559bf7ac4", algorithm="MD5", 
> cnonce="1b8d984a50488ce67a674ab9a90612fc", nc=00000001, qop="auth"
> --99fa9461-C--
> --99fa9461-F--
> HTTP/1.1 201 Created
> Authentication-Info: rspauth="deb189790e5971076389e53d958cb158", 
> cnonce="1b8d984a50488ce67a674ab9a90612fc", nc=00000001, qop=auth
> Cache-Control: no-cache
> Location: 
> http://localhost/svn/astlinux/!svn/act/709637a8-16ca-40eb-8008-8cb9d5bd189c
> Content-Length: 308
> Connection: close
> Content-Type: text/html; charset=ISO-8859-1
> --99fa9461-H--
> Message: Match of "rx ^OPTIONS$" against "REQUEST_METHOD" required. [file 
> "/etc/httpd/modsecurity.d/base_rules/modsecurity_crs_21_protocol_anomalies.conf"]
>  [line "46"] [id "960015"] [rev "2.0.5"] [msg "Request Missing an Accept 
> Header"] [severity "CRITICAL"] [tag "PROTOCOL_VIOLATION/MISSING_HEADER"] [tag 
> "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"]
> Message: Match of "within %{tx.allowed_methods}" against "REQUEST_METHOD" 
> required. [file 
> "/etc/httpd/modsecurity.d/base_rules/modsecurity_crs_30_http_policy.conf"] 
> [line "30"] [id "960032"] [msg "Method is not allowed by policy"] [data 
> "MKACTIVITY"] [severity "CRITICAL"] [tag "POLICY/METHOD_NOT_ALLOWED"] [tag 
> "WASCTC/WASC-15"] [tag "OWASP_TOP_10/A6"] [tag "OWASP_AppSensor/RE1"] [tag 
> "PCI/12.1"]
> Message: Warning. Operator LT matched 20 at TX:inbound_anomaly_score. [file 
> "/etc/httpd/modsecurity.d/base_rules/modsecurity_crs_60_correlation.conf"] 
> [line "31"] [msg "Inbound Anomaly Score (Total Inbound Score: 15, SQLi=, 
> XSS=): Method is not allowed by policy"]
> Apache-Handler: dav-handler
> Stopwatch: 1315243409275410 102579 (26119* 28723 -)
> Producer: ModSecurity for Apache/2.5.12 (http://www.modsecurity.org/); core 
> ruleset/2.0.5.
> Server: Apache/2.2.19 (Fedora)
> --99fa9461-Z--
> --99fa9461-A--
> [05/Sep/2011:11:23:29 --0600] TmUFkcCoAQoAABnmJFgAAAAC ::1 52684 ::1 80
> --99fa9461-B--
> CHECKOUT /svn/astlinux/!svn/vcc/default HTTP/1.1
> User-Agent: SVN/1.6.17 (r1128011) neon/0.29.5
> Connection: TE
> TE: trailers
> Host: localhost
> DAV: http://subversion.tigris.org/xmlns/dav/svn/depth, 
> http://subversion.tigris.org/xmlns/dav/svn/mergeinfo, 
> http://subversion.tigris.org/xmlns/dav/svn/log-revprops
> Content-Length: 208
> Accept-Encoding: gzip
> Authorization: Digest username="philipp", realm="Subversion repository", 
> nonce="+5sy+DSsBAA=d9c09363220f392546430d28d12b6348d29b7276", 
> uri="/svn/astlinux/!svn/vcc/default", 
> response="2e41665162866967cf328e068a7b6bf0", algorithm="MD5", 
> cnonce="1b8d984a50488ce67a674ab9a90612fc", nc=00000002, qop="auth"
> --99fa9461-C--
> <?xml version="1.0" encoding="utf-8"?><D:checkout 
> xmlns:D="DAV:"><D:activity-set><D:href>/svn/astlinux/!svn/act/709637a8-16ca-40eb-8008-8cb9d5bd189c</D:href></D:activity-set><D:apply-to-version/></D:checkout>
> --99fa9461-F--
> HTTP/1.1 403 Forbidden
> Content-Length: 306
> Connection: close
> Content-Type: text/html; charset=iso-8859-1
> --99fa9461-H--
> Message: Match of "rx ^OPTIONS$" against "REQUEST_METHOD" required. [file 
> "/etc/httpd/modsecurity.d/base_rules/modsecurity_crs_21_protocol_anomalies.conf"]
>  [line "46"] [id "960015"] [rev "2.0.5"] [msg "Request Missing an Accept 
> Header"] [severity "CRITICAL"] [tag "PROTOCOL_VIOLATION/MISSING_HEADER"] [tag 
> "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"]
> Message: Match of "rx ^0$" against "REQUEST_HEADERS:Content-Length" required. 
> [file 
> "/etc/httpd/modsecurity.d/base_rules/modsecurity_crs_21_protocol_anomalies.conf"]
>  [line "83"] [id "960904"] [rev "2.0.5"] [msg "Request Containing Content, 
> but Missing Content-Type header"] [severity "NOTICE"]
> Message: Match of "within %{tx.allowed_methods}" against "REQUEST_METHOD" 
> required. [file 
> "/etc/httpd/modsecurity.d/base_rules/modsecurity_crs_30_http_policy.conf"] 
> [line "30"] [id "960032"] [msg "Method is not allowed by policy"] [data 
> "CHECKOUT"] [severity "CRITICAL"] [tag "POLICY/METHOD_NOT_ALLOWED"] [tag 
> "WASCTC/WASC-15"] [tag "OWASP_TOP_10/A6"] [tag "OWASP_AppSensor/RE1"] [tag 
> "PCI/12.1"]
> Message: Access denied with code 403 (phase 2). [file 
> "/etc/httpd/modsecurity.d/base_rules/modsecurity_crs_49_enforcement.conf"] 
> [line "25"] [msg "Anomaly Score Exceeded (score 20): Method is not allowed by 
> policy"]
> Action: Intercepted (phase 2)
> Stopwatch: 1315243409378229 4605 (1720* 4100 -)
> Producer: ModSecurity for Apache/2.5.12 (http://www.modsecurity.org/); core 
> ruleset/2.0.5.
> Server: Apache/2.2.19 (Fedora)
> --99fa9461-Z--
> --99fa9461-A--
> [05/Sep/2011:11:23:29 --0600] TmUFkcCoAQoAABnkI6QAAAAA ::1 52685 ::1 80
> --99fa9461-B--
> DELETE /svn/astlinux/!svn/act/709637a8-16ca-40eb-8008-8cb9d5bd189c HTTP/1.1
> User-Agent: SVN/1.6.17 (r1128011) neon/0.29.5
> Connection: TE
> TE: trailers
> Host: localhost
> Accept-Encoding: gzip, gzip
> DAV: http://subversion.tigris.org/xmlns/dav/svn/depth, 
> http://subversion.tigris.org/xmlns/dav/svn/mergeinfo, 
> http://subversion.tigris.org/xmlns/dav/svn/log-revprops
> Content-Length: 0
> Authorization: Digest username="philipp", realm="Subversion repository", 
> nonce="+5sy+DSsBAA=d9c09363220f392546430d28d12b6348d29b7276", 
> uri="/svn/astlinux/!svn/act/709637a8-16ca-40eb-8008-8cb9d5bd189c", 
> response="0b2831fb296127fc8e156f7be91ce5bc", algorithm="MD5", 
> cnonce="1b8d984a50488ce67a674ab9a90612fc", nc=00000003, qop="auth"
> --99fa9461-C--
> --99fa9461-F--
> HTTP/1.1 204 No Content
> Authentication-Info: rspauth="0f23d425afe38d8fe4fd5e030e5184d3", 
> cnonce="1b8d984a50488ce67a674ab9a90612fc", nc=00000003, qop=auth
> Content-Length: 0
> Connection: close
> Content-Type: text/plain; charset=UTF-8
> --99fa9461-H--
> Message: Match of "rx ^OPTIONS$" against "REQUEST_METHOD" required. [file 
> "/etc/httpd/modsecurity.d/base_rules/modsecurity_crs_21_protocol_anomalies.conf"]
>  [line "46"] [id "960015"] [rev "2.0.5"] [msg "Request Missing an Accept 
> Header"] [severity "CRITICAL"] [tag "PROTOCOL_VIOLATION/MISSING_HEADER"] [tag 
> "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"]
> Message: Match of "within %{tx.allowed_methods}" against "REQUEST_METHOD" 
> required. [file 
> "/etc/httpd/modsecurity.d/base_rules/modsecurity_crs_30_http_policy.conf"] 
> [line "30"] [id "960032"] [msg "Method is not allowed by policy"] [data 
> "DELETE"] [severity "CRITICAL"] [tag "POLICY/METHOD_NOT_ALLOWED"] [tag 
> "WASCTC/WASC-15"] [tag "OWASP_TOP_10/A6"] [tag "OWASP_AppSensor/RE1"] [tag 
> "PCI/12.1"]
> Message: Warning. Operator LT matched 20 at TX:inbound_anomaly_score. [file 
> "/etc/httpd/modsecurity.d/base_rules/modsecurity_crs_60_correlation.conf"] 
> [line "31"] [msg "Inbound Anomaly Score (Total Inbound Score: 15, SQLi=, 
> XSS=): Method is not allowed by policy"]
> Apache-Handler: dav-handler
> Stopwatch: 1315243409383180 6291 (1711* 4241 -)
> Producer: ModSecurity for Apache/2.5.12 (http://www.modsecurity.org/); core 
> ruleset/2.0.5.
> Server: Apache/2.2.19 (Fedora)
> --99fa9461-Z--
> A partial fix was suggested as:
> <Location /svn>
>    ...
>    <IfModule mod_security2.c>
>       # SecRuleRemoveByTag "TX:INBOUND_ANOMALY_SCORE"
>       SecRule REQUEST_METHOD "^(PROPFIND|PROPPATH$)" allow
>       SecRule REQUEST_METHOD "^(REPORT|OPTIONS)$" allow
>       SecRule REQUEST_METHOD "^(MKACTIVITY|CHECKOUT)$" allow
>       SecRule REQUEST_METHOD "^(PUT|DELETE|MERGE)$" allow
>       SecRule REQUEST_METHOD "^(MKCOL)$" allow
>    </IfModule>
>    ...
> </Location>
> as a workaround, but this still results in some false positives.

--
This message is automatically generated by JIRA.
For more information on JIRA, see: http://www.atlassian.com/software/jira

        

_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to