*SecRule ARGS "@contains alter" \*
* "phase:request,\*
* rev:'2',\*
* ver:'OWASP_CRS/3.0.0',\*
* maturity:'9',\*
* accuracy:'8',\*
* capture,\*
* t:none,t:urlDecodeUni,\*
* block,\*
* msg:'Detects concatenated basic SQL injection and SQLLFI attempts',\*
* id:CHANGEHERE,\*
* tag:'application-multi',\*
* tag:'language-multi',\*
* tag:'platform-multi',\*
* tag:'attack-sqli',\*
* tag:'OWASP_CRS/WEB_ATTACK/SQL_INJECTION',\*
* tag:'WASCTC/WASC-19',\*
* tag:'OWASP_TOP_10/A1',\*
* tag:'OWASP_AppSensor/CIE1',\*
* tag:'PCI/6.5.2',\*
* logdata:'Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}:
%{MATCHED_VAR}',\*
* severity:'CRITICAL',\*
* setvar:'tx.msg=%{rule.msg}',\*
* setvar:tx.sql_injection_score=+%{tx.critical_anomaly_score},\*
* setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},\*
* setvar:'tx.%{rule.id
<http://rule.id>}-OWASP_CRS/WEB_ATTACK/SQLI-%{matched_var_name}=%{tx.0}'"*
* SecRule
REQUEST_COOKIES|!REQUEST_COOKIES:/__utm/|REQUEST_COOKIES_NAMES|ARGS_NAMES|!ARGS|XML:/*
"(?i:(?:[\d\W]\s+as\s*?[\"'`\w]+\s*?from)|(?:^[\W\d]+\s*?(?:union|select|create|rename|truncate|load|alter|delete|update|insert|desc)\b)|(?:(?:select|create|rename|truncate|load|delete|update|insert|desc)\s+(?:(?:group_)concat|char|load_file)\s?\(?)|(?:end\s*?\);)|([\"'`]\s+regexp\W)|(?:[\s(]load_file\s*?\())"
\*
* ctl:ruleRemoveTargetById=981260*
*I'm not sure, but I think this chain rule could work. *
On Mon, Mar 26, 2018 at 4:36 PM Christian Folini <
chr...@ne...> wrote:
> Hey Deanna,
>
> On Mon, Mar 26, 2018 at 11:12:20AM -0600, Deanna Stevenson wrote:
> > 8d85025e-H-- Message: Warning. Pattern match
> "(?i:(?:[\\d\\W]\\s+as\\s*?[\"
> > '`\\w]+\\s*?from)|(?:^[\\W\\d]+\\s*?(?:union|select|create|
> > rename|truncate|load|alter|delete|update|insert|desc)\\b)
> > |(?:(?:select|create|rename|truncate|load|alter|delete|
> > update|insert|desc)\\s+(?:(?:group_)concat|char|load ..." at
> ARGS:address1.
> > [file
> "/etc/modsec/sitebuyprod/rules/REQUEST-942-APPLICATION-ATTACK-SQLI.conf"]
> > [line "451"] [id "942360"] [rev "2"] [msg "Detects concatenated basic SQL
> > injection and SQLLFI attempts"] *[data "Matched Data: 1922 ALTER found
> > within ARGS:address1: 1922 ALTER St PHILADELPHIA, PA 19146"*] [severity
> > "CRITICAL"] [ver "OWASP_CRS/3.0.0"] [maturity "9"] [accuracy "8"] [tag
> > "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag
> > "attack-sqli"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [tag
> > "WASCTC/WASC-19"] [tag "OWASP_TOP_10/A1"] [tag "OWASP_AppSensor/CIE1"]
> [tag
> > "PCI/6.5.2"]
>
> You stumbled over this false positive here:
> https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/997
>
> You are far from the only one. It's just funny it took people almost a
> year to
> respond and since then, wherever we look, there is this FP.
>
> The 3.1/dev tree has an update to this rule merged in
> https://github.com/SpiderLabs/owasp-modsecurity-crs/pull/1013
>
> It's probably best to use this updated rule fule.
>
> Good luck and sorry for the inconvenience.
>
> Christian
>
>
> --
> Trust leaves on horseback but returns on foot.
> -- Donald Rumsfeld
>
>
> ------------------------------------------------------------------------------
> Check out the vibrant tech community on one of the world's most
> engaging tech sites, Slashdot.org! http://sdm.link/slashdot
> _______________________________________________
> mod-security-users mailing list
> mod...@li...
> https://lists.sourceforge.net/lists/listinfo/mod-security-users
> Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs:
> http://www.modsecurity.org/projects/commercial/rules/
> http://www.modsecurity.org/projects/commercial/support/
>
--
*Nenhum Sonho é grande demais.*
|