Morris,

I think this would certainly be the case. What is open is the criteria
to split the file. Werner has a point in stating, that 2 files are
not enough. But this is getting complicated.

Ahoj,

Christian



On Tue, Feb 02, 2016 at 09:43:23PM +0800, Morris Taylor wrote:
> Dear Christian,
> 
>     Dividing the pm file into several parts for eliminating false
>     positive sounds good for me. Should there be another rule id for
>     carrying the pm file for being associated with the paranoia mode
>     one? Thanks!
> 
> -- 
> BR, Morris
> 
> On Tue, Feb 2, 2016, at 04:17 PM, Christian Folini wrote:
> > Hello,
> > 
> > I'd like to discuss them here one by one.
> > 
> > Controversial Paranoia Mode Candidate 950907 (2.2.X) / 932100 (3.0.0rc1)
> > msg: Sytem Command Injection
> > 
> > Rule in 2.2.9:
> > SecRule
> > REQUEST_COOKIES|!REQUEST_COOKIES:/__utm/|!REQUEST_COOKIES:/_pk_ref/|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*
> > "(?i:(?:[\;\|\`]\W*?\bcc|\b(wget|curl))\b|\/cc(?:[\'\"\|\;\`\-\s]|$))" \
> >             
> > "phase:2,rev:'2',ver:'OWASP_CRS/2.2.9',maturity:'9',accuracy:'8',capture,t:none,t:normalisePath,ctl:auditLogParts=+E,block,msg:'System
> >  Command 
> > Injection',id:'950907',tag:'OWASP_CRS/WEB_ATTACK/COMMAND_INJECTION',tag:'WASCTC/WASC-31',tag:'OWASP_TOP_10/A1',tag:'PCI/6.5.2',logdata:'Matched
> >  Data: %{TX.0} found within %{MATCHED_VAR_NAME}: 
> > %{MATCHED_VAR}',severity:'2',setvar:'tx.msg=%{rule.msg}',setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},setvar:tx.%{rule.id}-OWASP_CRS/WEB_ATTACK/COMMAND_INJECTION-%{matched_var_name}=%{tx.0},skipAfter:END_COMMAND_INJECTION1"
> > 
> > Rule in 3.0.0rc1:
> > SecRule
> > REQUEST_COOKIES|!REQUEST_COOKIES:/__utm/|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*
> > "@pmf os-commands.data" \
> >     "msg:'Remote Command Execution (RCE) Attempt',\
> >     phase:request,\
> >     rev:'2',\
> >     ver:'OWASP_CRS/3.0.0',\
> >     maturity:'9',\
> >     accuracy:'8',\
> >     capture,\
> >     t:none,t:normalisePath,\
> >     ctl:auditLogParts=+E,\
> >     block,\
> >     id:'932100',\
> >     tag:'application-multi',\
> >     tag:'language-multi',\
> >     tag:'platform-multi',\
> >     tag:'attack-remote code execution',\
> >     tag:'OWASP_CRS/WEB_ATTACK/COMMAND_INJECTION',\
> >     tag:'WASCTC/WASC-31',\
> >     tag:'OWASP_TOP_10/A1',\
> >     tag:'PCI/6.5.2',\
> >     logdata:'Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: 
> > %{MATCHED_VAR}',\
> >     severity:'CRITICAL',\
> >     chain"
> >             SecRule MATCHED_VARS "@rx 
> > [`;\|&\r\n].*?(\.exe)?(\s+[-/])?.+[&<>\|]*?" \
> >                     "capture,\
> >                     setvar:'tx.msg=%{rule.msg}',\
> >                     setvar:tx.rce_score=+%{tx.critical_anomaly_score},\
> >                     setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},\
> >                     
> > setvar:tx.%{rule.id}-OWASP_CRS/WEB_ATTACK/RCE-%{matched_var_name}=%{tx.0}"
> > 
> > 
> > This rule is controversial for different reasons than the one in the
> > previous post.
> > 
> > It was a simple regex in 2.2.X. For 3.0.0 it has been enriched with a
> > data file:
> > https://raw.githubusercontent.com/SpiderLabs/owasp-modsecurity-crs/v3.0.0-rc1/rules/os-commands.data
> > 
> > In a response to my blogpost 
> > https://www.netnea.com/cms/2015/12/20/modsec-crs-2-2-x-vs-3-0-0-dev/
> > Chaim conceded the 3.0.0 version is still plagued by a lot of false
> > positives. Obviously so, if you look at the commands. After all, unix
> > commands are close to natural English for a good reason.
> > 
> > Now Franziska (collaborating on the paranoia mode) and I wonder if 
> > it would not make sense to split
> > os-commands.data into two or more files. The commands with few
> > false positives would remain in the standard file, commands generating
> > lots of false positives could then be moved into
> > os-commands-paranoia.data and be referenced in a separate rule
> > copying the behaviour of the standard rule.
> > 
> > Thoughts?
> > 
> > Christian
> > 
> > -- 
> > mailto:christian.fol...@netnea.com
> > http://www.christian-folini.ch
> > twitter: @ChrFolini
> > _______________________________________________
> > Owasp-modsecurity-core-rule-set mailing list
> > Owasp-modsecurity-core-rule-set@lists.owasp.org
> > https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set
> _______________________________________________
> Owasp-modsecurity-core-rule-set mailing list
> Owasp-modsecurity-core-rule-set@lists.owasp.org
> https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

-- 
mailto:christian.fol...@netnea.com
http://www.christian-folini.ch
twitter: @ChrFolini
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to