On Mon, May 12, 2014 at 2:44 PM, Anoop Saldanha <anoopsalda...@gmail.com> wrote: > Under CRS-2.2.9, under the "slr_rules" directory, each of these 2 > files have the above 2 rules but with different subsequent chains in 2 > different files. > > Filename: modsecurity_crs_46_slr_et_wordpress_attacks.conf > > # (2011257) SpiderLabs Research (SLR) Public Vulns: ET > WEB_SPECIFIC_APPS FireStats window-add-excluded-url.php Cross Site Sc\ > ripting Attempt > SecRule REQUEST_LINE "@contains > /wp-content/plugins/firestats/php/window-add-excluded-url.php" > "chain,phase:2,block,t:none,t\ > :urlDecodeUni,t:htmlEntityDecode,t:normalisePathWin,capture,logdata:'%{TX.0}',severity:'2',id:2011257,rev:2,msg:'SLR: > ET WEB\ > _SPECIFIC_APPS FireStats window-add-excluded-url.php Cross Site > Scripting Attempt',tag:'web-application-attack'" > > SecRule ARGS:edit > "(?i:edit\x3d.+(script|onmouse[a-z]+|onkey[a-z]+|onload|onunload|ondragdrop|onblur|onfocus|onclick|ondblcl\ > ick|onsubmit|onreset|onselect|onchange|style\x3D))" > "ctl:auditLogParts=+E,setvar:'tx.msg=ET WEB_SPECIFIC_APPS FireStats > wind\ > ow-add-excluded-url.php Cross Site Scripting > Attempt',setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},setvar:'tx.%{rul\ > e.id}-WEB_ATTACK/WORDPRESS-%{matched_var_name}=%{matched_var}'" > > Filename: modsecurity_crs_46_slr_et_xss_attacks.conf > > # (2011257) SpiderLabs Research (SLR) Public Vulns: ET > WEB_SPECIFIC_APPS FireStats window-add-excluded-url.php Cross Site Sc\ > ripting Attempt > SecRule REQUEST_LINE "@contains > /wp-content/plugins/firestats/php/window-add-excluded-url.php" > "chain,phase:2,block,t:none,t\ > :urlDecodeUni,t:htmlEntityDecode,t:normalisePathWin,capture,logdata:'%{TX.0}',severity:'2',id:2011257,rev:2,msg:'SLR: > ET WEB\ > _SPECIFIC_APPS FireStats window-add-excluded-url.php Cross Site > Scripting Attempt',tag:'web-application-attack'" > > SecRule &TX:'/XSS.*ARGS:edit/' "@gt 0" > "ctl:auditLogParts=+E,setvar:'tx.msg=ET WEB_SPECIFIC_APPS FireStats > window-add-exclud\ > ed-url.php Cross Site Scripting > Attempt',setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},setvar:'tx.%{rule.id}-WEB_ATT\ > ACK/XSS-%{matched_var_name}=%{matched_var}'" > > ----- > > Similarly for rule with id: 2011258. > > Is this behaviour intentional, or do we have a id numbering bug? >
To add to the above, it's not just the above rule, but there are a bunch of such rules between these 2 files, sharing the same id. -- ------------------------------- Anoop Saldanha http://www.poona.me ------------------------------- _______________________________________________ Owasp-modsecurity-core-rule-set mailing list Owasp-modsecurity-core-rule-set@lists.owasp.org https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set