Am 27.06.2013 13:31, schrieb Bremgartner, Lucas:
> 2. Rule Pre-Filtering
> Most of the remaining rules (except the last 3 rules: 973316, 973325, 973319 
> and of course rules from proposal 1) are beginning with one of the following 
> characters: < " '
> Therefore I propose to pre-filter the whole "XSS Filters from IE" rule block 
> (except the last 3 rules: 973316, 973325, 973319) with a rule like:
> 
> SecRule 
> REQUEST_COOKIES|!REQUEST_COOKIES:/__utm/|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*
>  "<|\"|\'" \
> "phase:2,id:'10000',rev:'2',ver:'OWASP_CRS/2.2.7',maturity:'8',accuracy:'8',t:none,t:htmlEntityDecode,t:compressWhiteSpace,pass,nolog,setvar:tx.pm_xss_filter_score=+%{tx.critical_anomaly_score}"
> SecRule &TX:PM_XSS_FILTER_SCORE "@eq 0" 
> "phase:2,id:'10001',t:none,pass,skipAfter:END_XSS_FILTER_CHECK,nolog"
> ...
> SecMarker END_XSS_FILTER_CHECK

Are these rules only handling XSS injections in context of HTML?
Or should they also match in CSS, JavaScript, JSON context?

If so, a prefix containing   "'<   is not sufficient, you need also 
,;.\/)]}|&=?+-
(and probably many more, as JavaScript is not limited to 7-bit US-ASCII :-)).

Just my 2 pence
Achim
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to