Thank you Josh, but I don't really want to create an exception.
Since it's just one client that triggers this, it's better to help him configure payment settings for his shop. So the question would be Where does that "d=d" come from, I can see it's in a cookie but why?

Regards
Peter

2014-07-23 11:41, Josh Amishav-Zlatin skrev:
On Wed, Jul 23, 2014 at 12:02 PM, Logg <l...@certitrade.net <mailto:l...@certitrade.net>> wrote:

    Hello

    We are running a payment system used by webshops. Now one new
    client gets a 403, I want to find out why so I can help client to
    configure their shop correctly.
    modsec logs tell me what rule is triggered, but I can't read out
    what data the client sends in.
    This only happens to this new client, so I will not modify my
    ruleset. I just need to assist our client who is obviously doing
    something wrong.


Hi,

If you look at section H below, the _jss_pstor cookie contains the string d=d which created a false positive on rule 950901. You can use the SecRuleUpdateTargetById directive to create an exception (e.g. SecRuleUpdateTargetById 950901 !REQUEST_COOKIES:_jss_pstor).

- Josh

        [22/Jul/2014:13:10:37 +0200] U85GrQpABwsAAGYtLgkAAAAC
        10.64.7.5 49941 10.64.7.11 443
        --ed091d42-B--
        POST /webshophtml/e/auth.php HTTP/1.1
        Host: our.payment.net <http://our.payment.net>
        Connection: keep-alive
        Content-Length: 951
        Cache-Control: max-age=0
        Accept:
        
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
        Origin: http://client_webshop.se
        User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64)
        AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.125
        Safari/537.36
        Content-Type: application/x-www-form-urlencoded
        Referer: http://client_webshop.se/checkout.php?sl=0&st=0
        Accept-Encoding: gzip,deflate,sdch
        Accept-Language: sv-SE,sv;q=0.8,en-US;q=0.6,en;q=0.4
        Cookie: _jss_popform_1524_count=1;
        
_jss_pstor=id%3Dda15bb533c3296281a7a3bad96266f93%3Afi%3D1404769754%3Ali%3D1404770148%3Aic%3D5%3Avc%3D1%3Anc%3D9f3d16019cf6fe2b%3A19f22ab828ca19a9cac8b0eed51911c0;
        __utma=188767033.1851339114.1404769702.1404769702.1404769702.1; 
__utmz=188767033.1404769702.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none)
        X-Forwarded-For: #.#.#.#

        --ed091d42-F--
        HTTP/1.1 403 Forbidden
        Content-Length: 224
        Keep-Alive: timeout=5, max=100
        Connection: Keep-Alive
        Content-Type: text/html; charset=iso-8859-1

        --ed091d42-E--

        --ed091d42-H--
        Message: Access denied with code 403 (phase 2). Pattern match
        
"(?i:([\\s'\"`\xc2\xb4\xe2\x80\x99\xe2\x80\x98\\(\\)]*?)([\\d\\w]++)([\\s'\"`\xc2\xb4\xe2\x80\x99\xe2\x80\x98\\(\\)]*?)(?:(?:=|<=>|r?like|sounds\\s+like|regexp)([\\s'\"`\xc2\xb4\xe2\x80\x99\xe2\x80\x98\\(\\)]*?)\\2|(?:!=|<=|>=|<>|<|>|\\^|is\\s+not|not\\
        ..." at REQUEST_COOKIES:_jss_pstor. [file
        "sec_rules/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"]
        [line "77"] [id "950901"] [rev "2"] [msg "SQL Injection
        Attack: SQL Tautology Detected."] [data "Matched Data: d=d
        found within REQUEST_COOKIES:_jss_pstor:
        
id=da15bb533c3296281a7a3bad96266f93:fi=1404769754:li=1404770148:ic=5:vc=1:nc=9f3d16019cf6fe2b:19f22ab828ca19a9cac8b0eed51911c0"]
        [severity "CRITICAL"] [ver "OWASP_CRS/2.2.7"] [maturity "9"]
        [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [tag
        "WASCTC/WASC-19"] [tag "OWASP_TOP_10/A1"] [tag
        "OWASP_AppSensor/CIE1"] [tag "PCI/6.5.2"]
        Action: Intercepted (phase 2)
        Apache-Handler: php5-script
        Stopwatch: 1406027437541081 3150 (- - -)
        Stopwatch2: 1406027437541081 3150; combined=1945, p1=330,
        p2=1581, p3=0, p4=0, p5=33, sr=99, sw=1, l=0, gc=0
        Response-Body-Transformed: Dechunked
        Producer: ModSecurity for Apache/2.8.0
        (http://www.modsecurity.org/); OWASP_CRS/2.2.7. <http://2.2.7.>
        Server: Apache
        Engine-Mode: "ENABLED"

    Regards
    Peter Haraldson

    _______________________________________________
    Owasp-modsecurity-core-rule-set mailing list
    Owasp-modsecurity-core-rule-set@lists.owasp.org
    <mailto:Owasp-modsecurity-core-rule-set@lists.owasp.org>
    https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set



_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to