-
-
Notifications
You must be signed in to change notification settings - Fork 402
Google OAuth redirects still being blocked due to ".profile" #2212
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Hi @mac-chaffee,
Can you recheck it? I will look at the additional parameters. |
I think that scope parameter is actually generated by Google themselves. That URL is where my browser gets redirected to after completing the Google login process. The process goes like this:
We do give Google the start of the URL in the GCP console ( |
Can you try with this regex? |
Hi @mac-chaffee! Were you able to test with the suggestion from @azurit ? That way we can push the fix with confidence it is working for your case. |
Sorry, I typed up a response and forget to hit "send" 🤦♂️ Yes, the regex matches my oauth URLs. However, I'm suspicious of the effectiveness of trying to detect google oauth requests from URL parameters alone, especially since if we do think we've detected google oauth, all OS file access is disabled. Is it not possible to strictly disable checks for the ".profile" file if we think we detect google oauth? Could that be accomplished by "rewriting this as a plugin" as @azurit suggested? That sounds ideal to me |
No but it would be possible to disable checks only for |
See #2232. |
Thanks @mac-chaffee |
@mac-chaffee Can you look at this? It's a replacement for current Google OAuth2 support (we are moving it from CRS core rules into plugins). Thank you! |
Uh oh!
There was an error while loading. Please reload this page.
Description
This is a resurfacing of Issue #1451 where a valid google oauth redirect gets blocked because it thinks you're trying to read from the ".profile" OS File.
A rule was implemented to try to detect google oauth and allow it:
coreruleset/rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf
Line 24 in cebc7fd
But it seems to be too specific and fails my redirects. Example:
Audit Logs / Triggered Rule Numbers
Sensitive data masked with "••••":
It's hitting this rule:
coreruleset/rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf
Line 107 in cebc7fd
Your Environment
Confirmation
[x] I have removed any personal data (email addresses, IP addresses,
passwords, domain names) from any logs posted.
The text was updated successfully, but these errors were encountered: