-
-
Notifications
You must be signed in to change notification settings - Fork 402
False positive for rule 921110 #2054
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Thank you for reporting this!
#1883 is a reported issue so there are no changes caused by it. This issue was resolved by PR #1966 (created on 1 Jan 2021), are you talking about this PR? If so, can you be more specific in CRS version which you are using? PR #1966 was not part of CRS 3.3.0 (release on 1 Jul 2020). |
@jdevreese Can you, please, provide more info? See above. Thank you! |
Must have made a mistake referencing that issue. But I was looking at this commit: 8f53825 Before: https://regex101.com/r/IgQJtL/2 Suggestion: check for word boundary before the keyword? |
@franbuehler Can you, please, explain why have you removed |
With this PR I wanted to resolve an issue reported by the security researcher Amit Klein. One important test for the reported issues (there were multiple) is: His bypass was not detected, because of two reasons:
Comparison of regexes with the reported issue: Before: https://regex101.com/r/WolWP9/1 We see that with the word boundary we don't find both HTTP requests. I hope this helps? Let me know if I can do anything, a PR or so... |
We talked about this in the April issue chat. Here is our conclusion: We lack the context of the commit that @franbuehler explained above. We need to wait for her to provide that context after her holidays. We can then look into the context and ideally come up with a better PR that does not lead to that many new false positives. |
Hi @theMiddleBlue Current regex and coverage is: https://regex101.com/r/BcDmYV/1 We see that with the word boundary we don't find both HTTP requests. Can you help me and do you know if the new proposal would be enough to find the request smuggling?? For more info see my comment above. Thank you :-) |
Hi, thank you for the recap! I tried the new regex but it seems prone to similar false positives such as Thanks! |
I had a look at this issue again and wanted to implement @theMiddleBlue's proposal when I saw that the false positive has already been resolved by Federico in 3.4/dev: However, I added two tests for the false positive and @theMiddleBlue's test in PR #2102. So this issue could be closed in my opinion. |
Uh oh!
There was an error while loading. Please reload this page.
Description
Uploading an xml containing text
budget foo)</bar>\n
triggers this false positive.Audit Logs / Triggered Rule Numbers
Rule ID: 921110
Your Environment
Confirmation
[X] I have removed any personal data (email addresses, IP addresses,
passwords, domain names) from any logs posted.
Probably caused by the changes in #1883
The text was updated successfully, but these errors were encountered: