Hi all,

I found one rule which doesn't check for =https:// RFI attacks:

./slr_rules/modsecurity_crs_46_slr_et_rfi_attacks.conf

SecRule QUERY_STRING|REQUEST_BODY
"(?i:_CONF\[.*\]=(http|ftps?|php)\:\/)"
"ctl:auditLogParts=+E,setvar:'tx.msg=ET WEB_SPECIFIC_APPS GeekLog
Remote File Include
Vulnerability',setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},setvar:'tx.%{rule.id}-WEB_ATTACK/RFI-%{matched_var_name}=%{matched_var}'"

This should be =(https?|ftps?|php) - same for all PHP remote file
includes, they're technically possible over any of those protocols.

( For that matter, data:// or zlib:// should be possible too - see
e.g. http://www.php.net/manual/en/wrappers.data.php , and
http://www.php.net/manual/en/wrappers.php

I have mentioned this to ET's Matt Jonkman in the past, but I gather
he was worried about the performance hit from checking
(=data|https?|ftps?|zlib| etc etc) for
all PHP RFI sigs in Emerging Threats. mod_security may not be so
sensitive to the extra pattern matches.  Just something to think about
- I can try for a proof of concept if anyone's interested?)

cheers,
 Jamie
--
Jamie Riden / ja...@honeynet.org / jamie.ri...@gmail.com
http://uk.linkedin.com/in/jamieriden


-- 
Jamie Riden / ja...@honeynet.org / jamie.ri...@gmail.com
http://uk.linkedin.com/in/jamieriden
Jamie Riden / ja...@honeynet.org / jamie.ri...@gmail.com
http://uk.linkedin.com/in/jamieriden
Jamie Riden / ja...@honeynet.org / jamie.ri...@gmail.com
http://uk.linkedin.com/in/jamieriden
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to