> Controversial Paranoia Mode Candidate 950120 (2.2.X) / 931130 (3.0.0rc1)
> msg: Possible Remote File Inclusion (RFI) Attack: Off-Domain Reference/Link 
> 
> […]
> 
> In my blogpost at
> https://www.netnea.com/cms/2016/01/17/most-frequent-false-positives-triggered-by-owasp-modsecurity-core-rules-2-2-x/
> I identified the said rule as one with very few false positives. Walter 
> however brought it up as a rule with many false positives.
> 
> A wider perspective is thus needed.
> 
> Does anybody has anything to add?

To talk about my opinion of with this rule a bit, it’s super easy to trigger it.
Just any text input for a URL will do.
For example: http://example/?url=https://yahoo.com/

That is super common and bound to give various false positives on registration 
forms, contact forms, blog comment forms, etcetera. Firing on any plain URL 
submitted in a form? That’s a prime example of being paranoid :)

Whether the rule annoys a user depends on the blocking score I guess. I 
personally block on first sight and think everybody should. As you guys said, 
with SQLi and XSS you usually get high scores, but with this type of 
vulnerability you just get one shot.

What could improve false positives?
- I have multiple whitelistings for this rule on ARGS:url. If I was 
non-paranoid, I would assume that IF a web application accepts a parameter 
called “url”, it’s pretty likely that this was intended to be a URL field and 
not an avenue for RFI. So ARGS:url could be excluded in normal mode.
- From a quick log grep, people absolutely LOVE to do LFI and RFI on parameters 
like ARGS:page and ARGS:id. Maybe others have more suggestions.

My recommendation would be:
1) Put the full rule in paranoid set
2) In the basic set, clone this rule, but ensure it doesn’t work on ARGS:url
3) In the basic set, possibly consider raising the anomaly score if it’s sent 
as ARGS:id, ARGS:page

-- 
Walter Hop | PGP key: https://lifeforms.nl/pgp

_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to