Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 181887 - net-www/mod_security-2.1.1 - Request for updated ruleset
Summary: net-www/mod_security-2.1.1 - Request for updated ruleset
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Linux
Classification: Unclassified
Component: New packages (show other bugs)
Hardware: All Linux
: High enhancement (vote)
Assignee: Luca Longinotti (RETIRED)
URL: http://www.modsecurity.org/download/i...
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2007-06-13 10:06 UTC by Joakim
Modified: 2007-09-08 08:13 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Joakim 2007-06-13 10:06:29 UTC
This might be of interest from the mod_security mailing list, in short a new core ruleset has been released and as far as I understand it's not included in 2.1.1 but has been tested with that version. Maybe someone can make a patch or
something to bring them in? 

From mod_security List:

Dear ModSecurity users,

A new version of the core rules, 1.4, is now available at
http://www.modsecurity.org/download/index.html.
The rules have been tested with version 2.1.1, and might not work with an older
version.
Please note that this ruleset is newer than the rules bundled with version
2.1.1 of ModSecurity.
Here's a list of the changes made in this version:

----------
New Events
----------
- 970021 - WebLogic information disclosure
    Matching of "<title>JSP compile error</title>" in the response body, will
trigger this rule, with severity 4 (Warning)
- 950015,950910,950911 - HTTP Response Splitting
   HTTP Response Splitting is described in Amit Klein's excellent article:
   
http://www.packetstormsecurity.org/papers/general/whitepaper_httpresponse.pdf
ModSecurity does not support compressed content at the moment. Thus, the
following rules have been added:
- 960013 - Content-Encoding in request not supported
    Any incoming compressed request will be denied
- 960051 - Content-Encoding in response not suppoted
    An outgoing compressed response will be logged to alert, but ONLY ONCE.

---------------------
False Positives Fixes
---------------------
The following FPs have been reported. They have been examined and found to be
commonly used in the web.
- Removed <.exe>,<.shtml> from restricted extensions
- Will not be looking for SQL Injection signatures <root@>,<coalesce> in the
Via request header
- Excluded Referer header from SQL injection, XSS and command injection rules
- Excluded X-OS-Prefs header from command injection rule
- Will be looking for command injection signatures in
  REQUEST_COOKIES|REQUEST_COOKIES_NAMES instead of REQUEST_HEADERS:Cookie.
- Allowing charset specification in the <application/x-www-form-urlencoded>
Content-Type
    i.e.: The following Content-Type will be allowed:
application/x-www-form-urlencoded; charset=ISO-8859-1
          (or any other valid charset)

----------------------
Additional rules logic
----------------------
- Corrected match of OPTIONS method in event 960015
    No transformation, and looking exactly for ^OPTIONS$, to dismiss it from
having an Accept header.
- Changed location for event 960014 (proxy access) to REQUEST_URI_RAW
    REQUEST_URI_RAW also contains the domain name, if provided by the client.
    In a normal case, a client will not provide the domain name in the URI
    The appearence of "http:/" in the URI, may imply an attempt for proxy
access.
- Moved all rules apart from method inspection from phase 1 to phase 2 -
    This will enable viewing content if such a rule triggers as well as setting
exceptions using Apache scope tags.
- Added match for double quote in addition to single quote for <or x=x>
signature (SQL Injection)
- Added 1=1 signature (SQL Injection)


Avi Aminov,
ModSecurity Core Rule Set Team



Reproducible: Always
Comment 1 Benedikt Böhm (RETIRED) gentoo-dev 2007-09-08 08:13:31 UTC
fixed in 2.1.2