Hi everybody,

As discussed earlier, I've found quite some issues with the PHP-related rules 
in CRSv3 rc1.
To not increase the scope of the paranoia project too much, it’s better work on 
these issues separately.

I’ve created bugs on Github for all the problems/possible improvemenst I’ve 
found. Please check the bugs and add your opinions in the comments! Here is a 
list:

- Rules not firing: 
https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/289
- php-function-names.data additions: 
https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/290
- Parentheses in php-function-names.data: 
https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/291
- php-variables.data evasions: 
https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/293
- Detect 'variable functions’: 
https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/294
- Add PHP specific files to lfi-os-files.data: 
https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/295
- Generic PHP serialized object injection: 
https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/273

I’ll probably have time to start working on these from next week on, so it 
would be nice to get as much input as possible during this week.

Cheers!
WH

_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to