Here are a couple of fixes I've made to the session hijacking CRS
2.2.5 rules in use with modsecurity 2.6.8.
Some of our cookie names have been changed, so ASPSESSIONIDXXX did not
match in RESPONSE_HEADERS:/Set-Cookie2?/ but did match in
REQUEST_COOKIES.

Also there is a bug related to comparisons on collection keys that do
not exist. When a request contains a cookie that has not been saved to
the SESSION collection before, the intention is for tx.anomaly_score
to be incremented by 5 (critical) and the rest of the checks skipped,
but this does not happen. Any test on a collection key that does not
exist always returns false. This means the test on SESSION:VALID "!@eq
1" returns false, when the intention is for it to return true if the
session cookie has not been seen before.  And the following rules in
the block are run which triggers 981059,981060,981061 to return true
since it is a new session collection withou ip_hash or ua_hash keys.

--
Ben

Attachment: modsecurity_crs_16_session_hijacking.conf.patch
Description: Binary data

_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to