Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 292411 - www-apache/mod_security-2.5.11 (version bump)
Summary: www-apache/mod_security-2.5.11 (version bump)
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Linux
Classification: Unclassified
Component: New packages (show other bugs)
Hardware: All Linux
: High enhancement
Assignee: Diego Elio Pettenò (RETIRED)
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2009-11-08 17:44 UTC by Joakim
Modified: 2009-11-16 10:20 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Joakim 2009-11-08 17:44:02 UTC
Hi!

mod_security-2.5.11 was released on Nov 4 - please bump.

ModSecurity 2.5.11 has been released and is now available.

This release fixes a multipart parsing issue that has the potential to 
allow bypassing the rules engine.  This bypass can be avoided via some 
simple rules, however.  Other changes include a rules update (CRS 2.0.3) 
and some minor cleanup in build, mlogc, persistence and the output 
filter ordering.

By using non-standard (but accepted by some platforms) quoting, 
ModSecurity may be fooled into thinking some parameters are uploaded 
files.  A working exmple was presented at POC2009.  To mitigate this, 
the following rules (also included in the latest CRS v2.0.3, included 
with ModSecurity 2.5.11) are recommended until you can update to 
ModSecurity 2.5.11:

# Identify multipart/form-data name evasion attempts
SecRule FILES "['\";=]" \
   "phase:2,deny,log,t:none,\
    msg:'Attempted multipart/form-data bypass'"
SecRule FILES_NAMES "['\";=]" \
   "phase:2,deny,log,t:none,\
    msg:'Attempted multipart/form-data bypass'"

Downloads and docs from modsecurity.org as usual.


04 Nov 2009 - 2.5.11
--------------------

  * Added a new multipart flag, MULTIPART_INVALID_QUOTING, which will be
    set true if any invalid quoting is found during multipart parsing.

  * Fixed parsing quoted strings in multipart Content-Disposition
    headers.  Discovered by Stefan Esser.

  * Cleanup persistence database locking code.

  * Added warning during configure if libcurl is found linked against
    gnutls for SSL.  The openssl lib is recommended as gnutls has
    proven to cause issues with mutexes and may crash.

  * Cleanup some mlogc (over)logging.

  * Do not log output filter errors in the error log.

  * Moved output filter to run before other stock filters (mod_deflate,
    mod_cache, mod_expires, mod_filter) to avoid analyzing modified data
    in the response.  Patch originally submitted by Ivan Ristic.

-- Brian Rectanus Breach Security

Reproducible: Always
Comment 1 Diego Elio Pettenò (RETIRED) gentoo-dev 2009-11-08 19:10:38 UTC
Not going to work on this before next week, please prod me if by, say, Tuesday 17th I've not bumped this (I'm taking a week-long vacation).
Comment 2 Diego Elio Pettenò (RETIRED) gentoo-dev 2009-11-16 10:20:23 UTC
Committed.