On 19 October 2012 19:05, Ryan Barnett <rbarn...@trustwave.com> wrote:
> Hey Jamie,
> I agree with your assessment and the need to strengthen the coverage.  We
> have a script that auto-converts the ET Snort web signatures from here -
> http://rules.emergingthreats.net/open/snort-2.8.4/rules/ - into the SLR
..
>
> #Submitted 2006-06-29 by Frank Knobbe
> #
> alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET
> WEB_SPECIFIC_APPS GeekLog Remote File Include Vulnerability";
> flow:established,to_server; uricontent:".php?"; nocase;
> uricontent:"_CONF"; nocase; pcre:"/_CONF\[.*\]=(http|ftps?|php)\:\//Ui";
> reference:url,securitydot.net/xpl/exploits/vulnerabilities/articles/1122/ex
> ploit.html; reference:url,doc.emergingthreats.net/2002996;
> classtype:web-application-attack; sid:2002996; rev:6;)
>
> When we don't get this clean param data, we revert to using the data
> provided by the original Snort rule writer.  So, your concerns about the
> regex are valid but we currently can't do much about it...

No worries; I have flagged this on the ET-list, so hopefully they'll
fix soon and the problem will go away for now.

cheers,
 Jamie
-- 
Jamie Riden / ja...@honeynet.org / jamie.ri...@gmail.com
http://uk.linkedin.com/in/jamieriden
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to