Sorry Christian. I didn't look in your tutorial CRS3:

152 x 942260 Detects basic SQL authentication bypass attempts 2/3
-----------------------------------------------------------------
      # ModSec Rule Exclusion: 942260 : Detects basic SQL authentication
bypass attempts 2/3
      SecRule REQUEST_URI "@beginsWith /drupal/index.php/search/node"
"phase:2,nolog,pass,id:10003,ctl:ruleRemoveTargetById=942260;ARGS:keys"

Regards

El mar., 15 de noviembre de 2016 20:44, Christian Folini <
christian.fol...@netnea.com> escribió:

> Kamil,
>
> Thanks for reporting.
>
> You are facing the following alerts:
>
> 920300 REQUEST_HEADERS:User-Agent     Request Missing an Accept Header
> 920300 REQUEST_HEADERS:User-Agent     Request Missing an Accept Header
> 942260 REQUEST_COOKIES:OutlookSession Detects basic SQL auth bypass
> 942260 REQUEST_COOKIES:OutlookSession Detects basic SQL auth bypass
>
> 920300 is usually legitimate and likely points to a client not sending
> the accept header like it should. This is a widespread misbehaviour.
> That is why we pushed the rule to paranoia level 2. You are apparently
> running PL2 or higher. You should thus tune this alert away via a rule
> exclusion.
>
> The 942260 is likely also legitimate. It's just that your poor client
> has a session cookie smelling of SQL authentication bypass. You
> should exclude the said cookie from the list of parameters examined
> by 942260.
>
> My tutorials at https://www.netnea.com/cms/apache-tutorials give
> you detailed step by step instructions how to do this.
>
> Best,
>
> Christian
>
>
>
> On Tue, Nov 15, 2016 at 05:54:52PM +0100, kamil kapturkiewicz wrote:
> > Hi,
> > I have had this issue with previous 2.2.9 version, but I am not really
> sure is related to mod_security it self or to CRS. The problem is with some
> Windows machines, below is the example from one of our corporate user, who
> is working on Windows 7 machine. I am pretty sure machine is not infected
> by malware or something, and this problem occures on FF, Chrome, Opera and
> IE. But in combination with fail2ban, this cut him off from web server
> every time he is trying to access company website. Do
> > you guys have any idea what is causing this?
> >
> > [Tue Nov 15 16:26:41.962933 2016] [:error] [pid 31434] [client
> 213.81.82.201] ModSecurity: Warning. Match of "pm
> > AppleWebKit Android" against "REQUEST_HEADERS:User-Agent" required.
> [file
> "/usr/share/owasp-modsecurity-crs/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"]
> [line "1251"] [id "920300"] [rev "3"] [msg "Request Missing an Accept
> Header"] [severity "NOTICE"] [ver "OWASP_CRS/3.0.0"] [maturity "9"]
> [accuracy "8"] [tag "application-multi"] [tag "language-multi"] [tag
> "platform-multi"] [tag "attack-protocol"] [tag
> "OWASP_CRS/PROTOCOL_VIOLATION/MISSING_HEADER_ACCEPT"] [tag
> "WASCTC/WASC-21"] [tag
> > "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [tag "paranoia-level/2"] [hostname
> "domain.com"] [uri "/autodiscover/autodiscover.xml"] [unique_id
> "WCs3QX8AAQEAAHrKJTMAAAAF"]
> > [Tue Nov 15 16:26:41.963976 2016] [:error] [pid 31434] [client
> 213.81.82.201] ModSecurity: Access denied with code 403 (phase 2). Pattern
> match
> "(?i:(?:union\\\\s*?(?:all|distinct|[(!@]*?)?\\\\s*?[([]*?\\\\s*?select\\\\s+)|(?:\\\\w+\\\\s+like\\\\s+[\\"'`])|(?:like\\\\s*?[\\"'`]\\\\%)|(?:[\\"'`]\\\\s*?like\\\\W*?[\\"'`\\\\d])|(?:[\\"'`]\\\\s*?(?:n?and|x?x?or|div|like|between|and|not|\\\\|\\\\||\\\\&\\\\&)\\\\s+[\\\\s\\\\w]+=\\\\s*?\\\\w+\\\\s*?h
> ..." at REQUEST_COOKIES:OutlookSession. [file
> >
> "/usr/share/owasp-modsecurity-crs/rules/REQUEST-942-APPLICATION-ATTACK-SQLI.conf"]
> [line "705"] [id "942260"] [rev "2"] [msg "Detects basic SQL authentication
> bypass attempts 2/3"] [data "Matched Data: \\x22{BB1B2590-E found within
> REQUEST_COOKIES:OutlookSession:
> \\x22{BB1B2590-EEE9-451E-9ABD-B75491F282EE}\\x22"] [severity "CRITICAL"]
> [ver "OWASP_CRS/3.0.0"] [maturity "9"] [accuracy "8"] [tag
> "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag
> "attack-sqli"] [tag
> > "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [tag "WASCTC/WASC-19"] [tag
> "OWASP_TOP_10/A1"] [tag "OWASP_AppSensor/CIE1"] [tag "PCI/6.5.2"] [tag
> "paranoia-level/2"] [hostname "domain.com"] [uri
> "/autodiscover/autodiscover.xml"] [unique_id "WCs3QX8AAQEAAHrKJTMAAAAF"]
> > [Tue Nov 15 16:26:44.390517 2016] [:error] [pid 31254] [client
> 213.81.82.201] ModSecurity: Warning. Match of "pm AppleWebKit Android"
> against "REQUEST_HEADERS:User-Agent" required. [file
> "/usr/share/owasp-modsecurity-crs/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"]
> [line "1251"] [id "920300"] [rev "3"] [msg "Request Missing an Accept
> Header"] [severity "NOTICE"] [ver "OWASP_CRS/3.0.0"] [maturity "9"]
> [accuracy "8"] [tag "application-multi"] [tag "language-multi"] [tag
> "platform-multi"] [tag
> > "attack-protocol"] [tag
> "OWASP_CRS/PROTOCOL_VIOLATION/MISSING_HEADER_ACCEPT"] [tag
> "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [tag
> "paranoia-level/2"] [hostname "domain.com"] [uri
> "/autodiscover/autodiscover.xml"] [unique_id "WCs3RH8AAQEAAHoWjIUAAAAD"]
> > [Tue Nov 15 16:26:44.391535 2016] [:error] [pid 31254] [client
> 213.81.82.201] ModSecurity: Access denied with code 403 (phase 2). Pattern
> match
> "(?i:(?:union\\\\s*?(?:all|distinct|[(!@]*?)?\\\\s*?[([]*?\\\\s*?select\\\\s+)|(?:\\\\w+\\\\s+like\\\\s+[\\"'`])|(?:like\\\\s*?[\\"'`]\\\\%)|(?:[\\"'`]\\\\s*?like\\\\W*?[\\"'`\\\\d])|(?:[\\"'`]\\\\s*?(?:n?and|x?x?or|div|like|between|and|not|\\\\|\\\\||\\\\&\\\\&)\\\\s+[\\\\s\\\\w]+=\\\\s*?\\\\w+\\\\s*?h
> ..." at REQUEST_COOKIES:OutlookSession. [file
> >
> "/usr/share/owasp-modsecurity-crs/rules/REQUEST-942-APPLICATION-ATTACK-SQLI.conf"]
> [line "705"] [id "942260"] [rev "2"] [msg "Detects basic SQL authentication
> bypass attempts 2/3"] [data "Matched Data: \\x22{BB1B2590-E found within
> REQUEST_COOKIES:OutlookSession:
> \\x22{BB1B2590-EEE9-451E-9ABD-B75491F282EE}\\x22"] [severity "CRITICAL"]
> [ver "OWASP_CRS/3.0.0"] [maturity "9"] [accuracy "8"] [tag
> "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag
> "attack-sqli"] [tag
> > "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [tag "WASCTC/WASC-19"] [tag
> "OWASP_TOP_10/A1"] [tag "OWASP_AppSensor/CIE1"] [tag "PCI/6.5.2"] [tag
> "paranoia-level/2"] [hostname "domain.com"] [uri
> "/autodiscover/autodiscover.xml"] [unique_id "WCs3RH8AAQEAAHoWjIUAAAAD"]
> >
> >
> >
> >
> > _______________________________________________
> > Owasp-modsecurity-core-rule-set mailing list
> > Owasp-modsecurity-core-rule-set@lists.owasp.org
> > https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set
> _______________________________________________
> Owasp-modsecurity-core-rule-set mailing list
> Owasp-modsecurity-core-rule-set@lists.owasp.org
> https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set
>
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to