Hello Ken, Classical False Positive.
You have your audit log parts configured to include only the I part. I think the uploaded filename in question is http://localhost:63391/d8edaf7f8a66068039906ecb9d04c451/image/7c2c6d05f122032b.jpg?size=1024 But could you please show us the C part - or dump the full traffic, we this becomes visible. And then, would you please open an issue on github for this? Cheers, Christian On Sun, Sep 04, 2016 at 08:26:37AM -0700, Ken Brucker wrote: > Playing with OWASP CRS v3.0 and have a false positive on rule 920120. > > The application is Picasa (no longer available from Google). During file > uploads it produces the failing pattern when communicating with the target > website. I have no control over the application end of this and there's no > hope for a fix from Google since they have dropped the product. It does still > work however so I continue to use it. > > I'm disabling this rule for this user agent using: > > SecRule REQUEST_HEADERS:User-Agent "@beginsWith Picasa/3." > "id:1010,phase:1,t:none,nolog,pass,ctl:ruleRemoveById=920120" > > > Here's the entry from the audit log: > > --93ede52c-A-- > [04/Sep/2016:07:57:20 --0700] V8w2UH8AAAEAADHQvy0AAABV 192.168.56.1 64619 > 192.16 > 8.56.101 80 > --93ede52c-B-- > POST /picasa_album_uploader/upload HTTP/1.1 > Host: wpdev.local > Accept: */* > Accept-Encoding: gzip > Content-Length: 117779 > Content-Type: multipart/form-data; > boundary=---------------------------98E77E01B > 348 > Cookie: > wordpress_logged_in_bdc5a801bed99bd8e2693412031c90e0=thor%7C1473173832%7 > COzgZxmia5N6cIlq8cByzDuXNOUtUG8ksqAsyHg12XMA%7Cd70c349c19dfc0274e629711840a30937 > a640e3c6f07362d76dab9bac3b58e68; wordpress_test_cookie=WP+Cookie+check > Connection: keep-alive > User-Agent: Picasa/3.9.141.306 (gzip) > > --93ede52c-I-- > picasa%2dalbum%2duploader%2dupload%2dimages=48fd37703c&%5fwp%5fhttp%5freferer=%2 > fpicasa%5falbum%5fuploader%2fminibrowser&size=on&title%5b%5d=IMG%5f5306%2eJPG&ca > ption%5b%5d=&description%5b%5d= > --93ede52c-F-- > HTTP/1.1 403 Forbidden > Content-Length: 237 > Connection: close > Content-Type: text/html; charset=iso-8859-1 > > --93ede52c-E-- > > --93ede52c-H-- > Message: Warning. Pattern match "['\";=]" at > FILES_NAMES:http://localhost:63391/ > d8edaf7f8a66068039906ecb9d04c451/image/7c2c6d05f122032b.jpg?size=1024. [file > "/v > agrant/owasp-modsecurity-crs/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] > [line > "108"] [id "920120"] [rev "1"] [msg "Attempted multipart/form-data bypass"] > [da > ta > "http://localhost:63391/d8edaf7f8a66068039906ecb9d04c451/image/7c2c6d05f12203 > 2b.jpg?size=1024"] [severity "CRITICAL"] [ver "OWASP_CRS/3.0.0"] [maturity > "9"] > [accuracy "7"] [tag "application-multi"] [tag "language-multi"] [tag > "platform-m > ulti"] [tag "attack-protocol"] [tag > "OWASP_CRS/PROTOCOL_VIOLATION/INVALID_REQ"] > [tag "CAPEC-272"] > Message: Access denied with code 403 (phase 2). Operator GE matched 5 at > TX:anom > aly_score. [file > "/vagrant/owasp-modsecurity-crs/rules/REQUEST-949-BLOCKING-EVAL > UATION.conf"] [line "53"] [id "949110"] [msg "Inbound Anomaly Score Exceeded > (To > tal Score: 5)"] [severity "CRITICAL"] [tag "application-multi"] [tag > "language-m > ulti"] [tag "platform-multi"] [tag "attack-generic"] > Message: Warning. Operator GE matched 5 at TX:inbound_anomaly_score. [file > "/vag > rant/owasp-modsecurity-crs/rules/RESPONSE-980-CORRELATION.conf"] [line "73"] > [id > "980130"] [msg "Inbound Anomaly Score Exceeded (Total Inbound Score: 5 - > SQLI=0 > ,XSS=0,RFI=0,LFI=0,RCE=0,PHPI=0,HTTP=0,SESS=0): Attempted multipart/form-data > by > pass"] [tag "event-correlation"] > Apache-Error: [file "apache2_util.c"] [line 271] [level 3] [client %s] > ModSecuri > ty: %s%s [uri "%s"]%s > Apache-Error: [file "apache2_util.c"] [line 271] [level 3] [client %s] > ModSecuri > ty: %s%s [uri "%s"]%s > Apache-Error: [file "apache2_util.c"] [line 271] [level 3] [client %s] > ModSecuri > ty: %s%s [uri "%s"]%s > Action: Intercepted (phase 2) > Stopwatch: 1473001040658089 39084 (- - -) > Stopwatch2: 1473001040658089 39084; combined=2811, p1=201, p2=2420, p3=0, > p4=0, > p5=189, sr=27, sw=1, l=0, gc=0 > Response-Body-Transformed: Dechunked > Producer: ModSecurity for Apache/2.9.1 (http://www.modsecurity.org/); > OWASP_CRS/ > 3.0.0. > Server: Apache/2.4.23 (Ubuntu) > Engine-Mode: "ENABLED" > > --93ede52c-J-- > 4,116587,"IMG_5306.JPG","<Unknown ContentType>" > Total,116587 > > --93ede52c-Z-- > > -- Ken > _______________________________________________ > Owasp-modsecurity-core-rule-set mailing list > Owasp-modsecurity-core-rule-set@lists.owasp.org > https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set -- https://www.feistyduck.com/training/modsecurity-training-course mailto:christian.fol...@netnea.com twitter: @ChrFolini _______________________________________________ Owasp-modsecurity-core-rule-set mailing list Owasp-modsecurity-core-rule-set@lists.owasp.org https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set