Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package owasp-modsecurity-crs for 
openSUSE:Factory checked in at 2025-01-28 17:06:16
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/owasp-modsecurity-crs (Old)
 and      /work/SRC/openSUSE:Factory/.owasp-modsecurity-crs.new.2316 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "owasp-modsecurity-crs"

Tue Jan 28 17:06:16 2025 rev:9 rq:1240848 version:4.9.0

Changes:
--------
--- 
/work/SRC/openSUSE:Factory/owasp-modsecurity-crs/owasp-modsecurity-crs.changes  
    2023-09-01 14:22:34.303429191 +0200
+++ 
/work/SRC/openSUSE:Factory/.owasp-modsecurity-crs.new.2316/owasp-modsecurity-crs.changes
    2025-01-28 17:06:17.421230934 +0100
@@ -1,0 +2,469 @@
+Tue Dec  3 08:13:47 UTC 2024 - Flavio Castelli <fcaste...@suse.com>
+- Version 4.9.0
+  * Important changes
+    - feat: add variable to skip response rules by @fzipi in #3944
+  * New features and detections
+    - feat: add fish shell files to restricted-files.data by @OhMyVolk in #3915
+    - feat: add quantitative testing to Git workflow by @airween in #3924
+  * Other Changes
+    - feat: added support for new web shells by @azurit in #3898
+    - fix(security): remove double URL decode (921151 PL2, 932190 PL3, 942441 
PL2, 942442 PL2, 942460 PL3) by @azurit in #3741
+    - docs: extended rule documentation (900200) by @dune73 in #3934
+- Version 4.8.0
+  * Important changes:
+    - fix: 9EA-241022 v4 by @RedXanadu in #3905
+  * New features and detections
+    - chore: set up nginx tests by @theseion in #3856
+  * Other Changes
+    - fix: remove unnecessary capture groups by @TimDiam0nd in #3849
+    - fix(942120): update operators by @Xhoenix in #3841
+    - fix(933120): do not match on base64 encoded strings by @fzipi in #3863
+    - fix(refactor): 942130 and 942131 regex-assembly by @Xhoenix in #3862
+    - fix(942520): SQL operators can be one or more characters by @Xhoenix in 
#3845
+    - chore: remove verify id-range by @fzipi in #3885
+    - chore: remove find-max-datalen-in-tests by @fzipi in #3891
+    - chore: remove honeypot sensor by @fzipi in #3883
+    - chore: remove browser tools by @fzipi in #3887
+    - chore: remove send-payload-pls by @fzipi in #3879
+    - chore: remove geo-location by @fzipi in #3875
+    - chore: remove crs2 renumbering by @fzipi in #3873
+    - chore: remove change-version script by @fzipi in #3869
+    - chore: remove join multiline rules by @fzipi in #3877
+    - chore: remove av-scanning by @fzipi in #3871
+    - chore: remove util virtual patching by @fzipi in #3889
+    - fix: include v3.3.6 release notes in latest by @fzipi in #3867
+    - chore: remove fp-finder by @fzipi in #3893
+- Version 4.7.0
+  * New features and detections
+    - feat: added sendgrid.env into restricted files by @azurit in #3823
+  * Other Changes
+    - fix: Changed regex (920470) to match multiple whitespaces after 
Content-Type parameters to avoid false-positives by @lostmann-owl-it in #3818
+    - fix: fp with user-agent containing ; pg (932239 PL2) by @franbuehler in 
#3727
+    - fix: update xss detection with onwebkitplaybacktargetavailabilitychanged 
event by @fzipi in #3822
+    - feat: refactoring (944110 PL1) by @azurit in #3715
+- Version 4.6.0
+  * Important changes:
+    - fix: prevent using backslash in file names by @fzipi in #3799
+    - feat: add new rule to catch invalid character in multipart headers by 
@airween, @theseion, @fzipi in #3796
+  * Other Changes
+    - feat: rule to detect bash tilde expansion by @Xhoenix in #3765
+    - fix: Update 932270's ver by @airween in #3786
+    - perf: remove unnecessary chain rule and capture (921180 PL3) by 
@EsadCetiner in #3787
+    - fix: add pem to restricted file extensions by @EsadCetiner in #3789
+    - fix(942160): check REQUEST_FILENAME by @mat1010 in #3782
+- Version 4.5.0
+  * New features and detections
+    - feat: added arithmetic expansion payload by @Xhoenix in #3756
+  * Other Changes
+    - fix(security): alias false negative by @Xhoenix in #3740
+    - feat: add test overrides for nginx by @theseion in #3369
+    - fix: use proper capture for log output of 932300 by @theseion in #3763
+    - chore: use lowercase character class for 932320 by @theseion in #3772
+    - fix: remove nonnecessary variable (932260 PL1) by @dune73 in #3773
+- Version 4.4.0
+  * New features and detections
+    - feat: skip response rules if data are compressed by @azurit in #3742, 
#3712
+  * Other Changes
+    - fix(934140): update regex by @fzipi in #3731
+    - fix: replacing t:UrlDecode with t:UrlDecodeUni (921240 PL1, 932170 PL1, 
932171 PL1, 932190 PL3, 932190 PL1, 933211 PL3, 941310 PL1, 941350 PL1) by 
@azurit in #3713
+- Version 4.3.0
+  * New features and detections
+    - feat: catch Java PostgreSQL errors (951240 PL1) by @azurit in #3686
+    - feat: block The Mysterious Mozlila User Agent bot (913100 PL1) by 
@brentclark in #3646
+  * Other Changes
+    - fix: Oracle SQL database data leakage FP (951120 PL1) by @azurit in #3685
+    - fix: typos in 920330 and 942280 tests by @TimDiam0nd in #3688
+    - test: change pl-1 to pl1 to be inline with others by @TimDiam0nd in #3690
+    - feat: use renovate to update docker-compose by @theseion in #3697
+    - fix: FP for sched (932235 PL1, 932236 PL2, 932237 PL3, 932239 PL2, … 
by @theseion in #3701
+    - fix: collections not being initialized without User-Agent header by 
@azurit in #3645
+    - feat: refactoring of rule 941310 (PL1 941310) by @azurit in #3700
+    - fix: resolving more FPs with Oracle error messages (951120 PL1) by 
@azurit in #3703
+    - fix: removing double t:urlDecodeUni (920221 PL1, 920440 PL1, 932200 PL2, 
932205 PL2, 932206 PL2) by @azurit in #3699
+    - fix: false positives from PHP config directives and functions (933120 
PL1, 933151 PL2) by @ssigwart in #3638
+    - feat: prevent detection of web shells rules as malware by Windows 
Defender (955260 PL1) by @azurit in #3687
+    - fix: fp with name axel by removing it from rce rule (932260 PL1) by 
@franbuehler in #3705
+- Version 4.2.0
+  * Changes with direct rule impact (sorted by lowest rule ID per change where 
available):
+    - fix: increase length of Accept-Encoding header from 50 to 100 (920520 
PL1) (Franziska Bühler) [#3661]
+    - fix: add missing roundcube files (930120 PL1, 930121 PL2, 930130 PL1, 
932180 PL1) (Esad Cetiner) [#3635]
+    - fix: add visudo and cscli to unix-shell.data (932160 PL1, 932161 PL2) 
(Esad Cetiner) [#3663]
+    - feat: block crowdsec cscli and visudo commands (932235 PL1, 932236 PL2, 
932237 PL3, 932239 PL2, 932260 PL1) (Esad Cetiner) [#3649]
+    - fix: add detection for php evasion attempt (933100 PL1) (Franziska 
Bühler) [#3667]
+  * Changes without direct rule impact:
+    - feat: disassemble php rule (933100 PL1) (Franziska Bühler) [#3662]
+    - chore: remove references to nonexistant 942110 rule (Esad Cetiner) 
[#3648]
+- Version 4.1.0.
+  - feat: add check for combinations of t:lowercase and (?i) to lint 
(Franziska Bühler) [#3584]
+  - feat: add support for additional ansible and chef commands (932160 PL1, 
932161 PL2, 932235 PL1, 932260 PL1, 932236 PL2, 932239 PL2, 932237 PL3) (Esad 
Cetiner) [#3601]
+  - feat: move HTTP header rules to phase 1 (932161 PL2, 932205 PL2, 932206 
PL2, 932237 PL3) (Esad Cetiner) [#3570]
+  - fix: prevent FPs against names due to "cron" (932260 PL1, 932236 PL2, 
932237 PL3, 932239 PL2) (@superlgn) [#3578]
+  - fix: add missing tags and ver action (various rules) (Jozef Sudolský) 
[#3571]
+  - fix: adding more missing tags and ver actions (Jozef Sudolský) [#3593]
+  - fix: do not check URL fragments in referer headers as part of the existing 
rule to prevent FPs (932205 PL2) (Max Leske) [#3485]
+  - fix: range expressions must not start with \v (various rules) (Max Leske) 
[#3615]
+  - fix: remove t:lowercase from rules that use '(?i)' modifier in their regex 
(942150 PL2, 942151 PL1, 942152 PL2) (Ervin Hegedus) [#3585]
+  - test: change HTTP method to uppercase for test 932260-28 (Matteo Pace) 
[#3580]
+  - chore(deps): update workflow actions (Max Leske) [#3613]
+  - chore: add Esad Cetiner to list of developers (@EsadCetiner) [#3589]
+- Version 4.0.0.
+  * Important changes:
+    - feat: introduce plugin architecture for extending CRS and minimizing 
attack surface. (Christian Folini, Max Leske, Jozef Sudolský, Andrew Howe) 
[#2038, #2448, #2404]
+    - feat: migrate application exclusions and less-used functionality to 
plugins (Christian Folini, Max Leske, Jozef Sudolský, Andrew Howe)
+    - feat: introduce early blocking option (Christian Folini) [#1955]
+    - feat: introduce new rule file/category to detect use of common web 
shells in responses (955100-955340 PL1, 955350 PL2) (Jozef Sudolský, Andrea 
Menin) [#1962, #2039, #2116]
+    - feat: rename 'Node.js' category to 'generic' (Felipe Zipitría) [#2340]
+    - feat: make all formerly PCRE-only regular expressions compatible with 
RE2/Hyperscan regular expression engines (Max Leske, Felipe Zipitría, Allan 
Boll, Franziska Bühler) [#1868, #2356, #2425, #2426, #2371, #2372]
+    - feat: add support for HTTP/3 (Jozef Sudolský) [#3218]
+    - feat: add granular control over reporting levels in 9801xx rules (Simon 
Studer, Andrew Howe, Christian Folini) [#2482, #2488]
+    - feat: add new rule to explicitly detect multiple Content-Type abuse 
(CVE-2023-38199) (920620 PL1) (Andrea Menin) [#3237]
+    - feat: add enable_default_collections flag to not initialize collections 
by default (Matteo Pace) [#3141]
+    - feat: extend definition of restricted headers to include 
Content-Encoding and Accept-Charset by default (920450 PL1, 920451 PL2) (Walter 
Hop) [#2780, #2782]
+    - feat: drop HTTP/0.9 support to resolve FP (Federico G. Schwindt) [#1966]
+    - fix: refactor and rename anomaly scoring variables and paranoia level 
definition (Simon Studer) [#2417]
+    - tests: complete goal of 100% test coverage for rules (entire team, 
Juan-Pablo Tosso, NiceYouKnow)
+    - feat: switch to using WordNet instead of spell for finding English words 
in spell.sh (Max Leske) [#3242]
+    - feat: publish nightly packages regularly (Felipe Zipitría) [#2207]
+  * Changes with direct rule impact (sorted by lowest rule ID per change where 
available):
+    - feat: add placeholder files for new plugin architecture (Walter Hop) 
[#2515]
+    - feat: check initialization and use for all TX variables (Ervin Hegedus) 
[#3043]
+    - feat: extend rule to detect restricted method override headers (Mark 
Zeman / KramNamez) [#3056]
+    - feat: extend rules to detect keyword time as prefix of *nix and Windows 
RCE rules (rules later replaced) (Franziska Bühler) [#2819]
+    - feat: improve Unix shell evasion prefix (various rules) (Jitendra Patro, 
Max Leske) [#3518]
+    - feat: improve performance by removing unnecessary lowercase 
transformations (various rules) (Jozef Sudolský) [#2106]
+    - feat: add additional prefix commands to 'unix-shell-evasion-prefix' 
(various rules) (Jitendra Patro) [#3557
+    - feat: consolidate 'unix-evasion-prefix*' files to ensure they don't 
diverge (various rules) (Franziska Bühler, Max Leske, Andrew Howe) [#3531]
+    - feat: move regexp-assemble data files to root directory (Felipe 
Zipitría) [#3002]
+    - feat: move rules to the earliest phase possible based on their inputs 
(various rules) (Ervin Hegedus) [#1941]
+    - feat: remove superfluous 'urlDecodeUni' transformations (various rules) 
(Federico G. Schwindt) [#1845]
+    - feat: rename 'tx.blocking_early' to 'tx.early_blocking' (various rules) 
(Christian Folini) [#2414]
+    - feat: simplify regular expressions by replacing upper-case with 
lower-case matches if the expression is case-insensitive (various rules) 
(Felipe Zipitría) [#2485]
+    - feat: remove SecCollectionTimeout from crs-setup.conf (Christian Folini) 
[#3559]
+    - fix: do not log 'MATCHED_VAR' when the it contains the full response 
body (various rules) (Jozef Sudolský) [#1985]
+    - fix: do not unnecessarily escape forward slashes in regular expressions 
(various rules) (Federico G. Schwindt) [#1842]
+    - fix: reformat several initialization rules to follow project guidelines 
(Ervin Hegedus) [#3157]
+    - fix: remove auditLogParts actions from all rules where present (Andrea 
Menin, Ervin Hegedus) [#3034, #3081]
+    - fix: remove uncommon Content Types from default in 
crs-setup.conf.example (Andrea Menin) [#2768]
+    - fix: update diverse rules to follow new naming convention with paranoia 
level TX variables (Christoph Hansen) [#2937]
+    - fix: update various rules to consolidate use of backslashes to \x5c 
representation for better compatibility with known WAF engines (various rules) 
(Andrew Howe, Max Leske) [#2335, #2345, #2375, #2376, #2399, #2400, #2402, 
#2410, #2420, #2441, #2442, #2454, #2426]
+    - fix: remove initialization rules for redundant IP reputation variables 
(901150, 901152) (Andrew Howe) [#2833]
+    - fix: initialize all variables used properly (901169) (Ervin Hegedus) 
[#2802]
+    - feat: improve sampling mode efficiency (901410, 901420, 901440) (Paul 
Beckett) [#2094]
+    - fix: replace uses of 'ctl:ruleEngine=Off' with 
"ctl:ruleRemoveByTag=OWASP_CRS" to accomodate more than one ruleset (901450, 
905100, 905110) (Jozef Sudolský) [#2156]
+    - feat: remove old, commented-out IP reputation check rule (910110 PL1) 
(Paul Beckett) [#2148]
+    - feat: detect 'burpcollaborator' scanner (913100 PL1) (Amir Hosein 
Aliakbarian) [#2152]
+    - feat: detect 'httpx' scanner (913100 PL1) (Will Woodson) [#2045]
+    - feat: detect 'LeakIX' scanner (913100 PL1) (Jozef Sudolský) [#1961]
+    - feat: detect 'QQGameHall' malware (913100 PL1) (Walter Hop) [#2144]
+    - feat: detect User-Agent of Tsunami Security Scanner (913100 PL1) 
(@hoexter) [#3480]
+    - fix: avoid FP for YAM package manager (913100 PL1) (Jozef Sudolský) 
[#2022]
+    - fix: move 'ecairn' from scanners to crawlers (913100 PL1) (Felipe 
Zipitría) [#2408]
+    - feat: detect 'CensysInspect' and seoscanners.net crawlers (913102 PL2) 
(Andrew Howe) [#2155]
+    - feat: detect 'ecairn' crawler (913102 PL2) (Jozef Sudolský) [#2024]
+    - feat: detect 'Krzana' bot (913102 PL2) (Deepshikha Sinha) [#2432]
+    - fix: remove rule to detect security scanner http headers (913110 PL1) 
(Christian Folini) [#3241]
+    - feat: remove ineffective anti-scanner list scanners-urls.data and 
associated rule (913120 PL1) (Christian Folini) [#3235]
+    - fix: correct the regular expression assembly (920120 PL1) (Max Leske) 
[#2333]
+    - feat: increase rule score from warning to critial (920220 PL1) (Max 
Leske) [#3512]
+    - fix: reduce FPs by handling the last path segment separately in new rule 
(920220 PL1, 920221 PL1) (Max Leske) [#3512]
+    - fix: reduce FPs by matching on decoded variables (920220 PL1) (Max 
Leske) [#3512]
+    - feat: prevent FPs by moving rule to higher PL (920240 PL2) (Max Leske) 
[#3506]
+    - feat: valiadate 'SEC-CH-UA' and 'SEC-CH-UA-MOBILE' request headers 
(920274 PL4) (Chaim Sanders) [#1970]
+    - fix: use the right kind of validation for 'Sec-CH-UA' and 
'Sec-CH-UA-Mobile' request headers (920274 PL4, 920275 PL4) (somechris) [#2028]
+    - fix: make validatioin of 'Sec-Fetch-User' header more strict (920275 
PL4) (somechris) [#2020]
+    - feat: move rule from PL2 to PL3 (920300 PL3) (Franziska Bühler) [#2013]
+    - fix: amend rule to exclude CONNECT requests from requiring an Accept 
header (920300 PL3) (Andrew Howe) [#2297]
+    - feat: add IPv6 to the 'Host header is a numeric IP address' check 
(920350 PL1) (itsTheFae, Ervin Hegedus, Jozef Sudolský) [#1929]
+    - fix: avoid FP on '.axd' in restricted extensions, these are public 
(920440 PL1) (Jozef Sudolský) [#1925]
+    - feat: rework restricted headers mechanism into two separate lists 
(920450 PL1, 920451 PL2) (Andrew Howe) [#3152]
+    - fix: avoid FP in 'application/*+json' Content-Type (920470 PL1) (Mirko 
Dziadzka, Walter Hop) [#2455]
+    - fix: avoid FP in CalDAV Content-Type (920470 PL1) (Vandan Rohatgi) 
[#2505]
+    - fix: avoid FP in 'Content-Type' header with '#' character (920470 PL1) 
(Jozef Sudolský) [#1856]
+    - fix: avoid FP on 'version' string in Content-Type header (920470 PL1) 
(Jozef Sudolský) [#1901]
+    - fix: resolve false negative when matching against allowed charsets 
variable (920480 PL1) (katef, Federico G. Schwindt) [#1957]
+    - fix: replace unnecessary capture groups in regular expressions with 
non-capturing groups (920510 PL3, 932200 PL2, 942510 PL2, 942511 PL3) (Federico 
G. Schwindt) [#1983]
+    - feat: improve explanatory rule comments (920520 PL1) (Max Leske) [#2391]
+    - feat: validate 'Accept-Encoding' header (920520 PL1, 920521 PL3) 
(Franziska Bühler) [#2357]
+    - feat: new rule detect multiple occurrences of charset keyword in content 
type header (920530 PL1) (Jan Gora / terjanq) [#2571]
+    - feat: new rule to detect Unicode character bypass check for non JSON 
requests (920540 PL1) (Franziska Bühler, 0SPwn) [#2512]
+    - feat: new rule to detect # char in URIs (920610 PL1) (Karel Knibbe) 
[#2919]
+    - fix: use correct anomaly scoring variables and paranoia level tags 
across several rules (921170 PL1, 921220 PL4, 932220 PL2, 932331 PL3, 933211 
PL3, 934101 PL1, 942362 PL2, 951100) (Christoph Hansen) [#2931]
+    - feat: new rules to detect HTTP parameter pollution bypasses (921210 PL3, 
921220 PL4) (Christian Folini) [#2747]
+    - fix: use correct anomaly scoring variables and paranoia level tags 
across several rules (921220 PL4, 932101 PL2, 932331 PL3, 933211 PL3, 942362 
PL2) (Ervin Hegedus) [#2832]
+    - feat: new rule to detect range header that is now forbidden on PL3 and 
up (921230 PL3) (Christian Folini) [#2760]
+    - feat: new rule to detect mod_proxy attack (CVE-2021-40438) (921240 PL1) 
(Franziska Bühler) [#2818]
+    - fix: add urlDecodeUni transformation rules with REQUEST_URI / 
REQUEST_BASENAME in phase 1 (921240 PL1, 920440 PL1, 920201 PL2, 920202 PL4) 
(Christian Folini) [#3411]
+    - feat: new rules to detecting ModSecurity body processor confusion using 
the Content-Type HTTP header (921421 PL1, 921422 PL2) (Simon Studer, Ervin 
Hegedus) [#2763]
+    - fix: handle false positives when detecting ModSecurity body processor 
confusion (921422 PL2) (Ervin Hegedus) [#2784]
+    - feat: new rules detecting attacks on multipart headers (922100 PL1, 
922110 PL1, 922120 PL1) (Felipe Zipitría) [#2769]
+    - fix: prevent unintended match of character set substrings in 
multipart/form-data requests (922100 PL1) (Jozef Sudolský) [#3470]
+    - feat: remove redundant t:lowercase for a little performance (922110 PL1) 
(Jozef Sudolský) [#3469]
+    - fix: remove possessive quantifiers (922110 PL1) (Felipe Zipitría) 
[#2989]
+    - fix: update comments (922110 PL1, 942440 PL2) (Jozef Sudolský) [#3468]
+    - fix: add missing quotes at the end of action lists (930050) (Ervin 
Hegedus) [#2184]
+    - feat: disassemble regular expression (930100 PL1) (Andrew Howe) [#2298]
+    - fix: detect path traversal in uploaded file names (930100 PL1, 930110 
PL1) (k4n5ha0, Franziska Bühler, Felipe Zipitría) [#2451]
+    - fix: detect triple dot path traversal (930100 PL1, 930110 PL1) 
(Franziska Bühler) [#2309, #2310]
+    - feat: extended rule to detect Tomcat specific path traversal attack 
(930110 PL1) (Christoph Hansen) [#2915]
+    - fix: avoid FP for '..' without slashes (930110 PL1) (Tetrik, Walter Hop) 
[#2016]
+    - feat: block access to AWS CLI files (930120 PL1, 930121 PL2) (Jozef 
Sudolský) [#2439]
+    - feat: block access to extended list of sensitive files (930120 PL1, 
930121 PL2, 930130 PL1) (Jozef Sudolský) [#1960]
+    - feat: detect /proc and /sys access attempts (930120 PL1, 930130 PL1) 
(Andrew Howe) [#2154]
+    - feat: extend rule to detect access attempts to /tmp/ (930120 PL1, 930121 
PL2) (Max Leske) [#3131]
+    - feat: extend rule to detect ECDSA type SSH identity files via list of 
sensitive *nix files (930120 PL1) (Pinaki Mondal / 0xInfection) [#2586]
+    - fix: avoid detecting Google OAuth2 callback requests as malicious 
(930120 PL1, 930121 PL1) (Jozef Sudolský, Christian Folini) [#1958]
+    - feat: extend rule to detect additional sensitive files on *nix systems 
(930121 PL2, 930130 PL1) (Gwendal Le Coguic / gwen001) [#2560]
+    - feat: new rules to detect LFI and SQLi in user-agent and referer request 
headers (930121 PL2, 942152 PL2, 942321 PL2) (Franziska Bühler, Max Leske, 
Shivam Bathla) [#3102]
+    - fix: extend rule to detect more LFI (930121 PL2) (Felipe Zipitría) 
[#2791]
+    - feat: add BlockCypher.log to restricted-files.data (930130 PL1) (Jozef 
Sudolský) [#3501]
+    - feat: add 'sslvpn_websession' to restricted-files.data (930130 PL1) 
(Jozef Sudolský) [#2338]
+    - feat: add .vscode to restricted-files.data (930130 PL1) (Frederik Himpe) 
[#3471]
+    - feat: extend data file to include additional restricted file names 
(restricted-files.data, 930130 PL1) (Jitendra Patro) [#3219]
+    - feat: extend data file to include PrestaShop configuration file 
(restricted-files.data, 930130 PL1) (Jean-François Viguier) [#3192]
+    - feat: extend rule to detect npm-shrinkwrap.json to restricted-files 
(930130 PL1) (Esa Jokinen / oh2fih) [#2627]
+    - fix: block access to the Java-related WEB-INF directory (930130 PL1) 
(Jozef Sudolský) [#2092]
+    - fix: remove duplicate keyword (930130 PL1) (Jozef Sudolský) [#3517]
+    - feat: extend rules to detect additional protocols in RFI attacks (931130 
PL2, 934120 PL2) (Karel Knibbe) [#2572]
+    - feat: extend rule to detect url:file: schema in Java RFI attacks (931130 
PL2) (Andrew Howe) [#2727]
+    - fix: add local_file scheme from Python 2 (931130 PL2, 934120 PL2) 
(Felipe Zipitría) [#2809]
+    - fix: close userinfo-based bypass (931130 PL2) (Andrea Menin) [#2479]
+    - feat: new rule to detect path traversal attacks using URL encoded URL 
schemes in Java applications (931131 PL2) (Christoph Hansen) [#2902]
+    - feat: extend rule to detect additional *nix shell commands (931160 PL1) 
(Gwendal Le Coguic / gwen001) [#2563]
+    - feat: disassemble complex regexes for 932xxx rules that were 
subsequently replaced by other rules (Max Leske) [#2566]
+    - feat: detect additional Unix RCE commands (932100 PL1, 932105 PL1) 
(Felipe Zipitría) [#2129]
+    - feat: extend rule to detect additional entries to *nix command lists 
(932100 PL1, 932105 PL1) (Finn Westendorf / wfinn) [#2552]
+    - feat: extend rule to detect additional *nix commands (932100 PL1) 
(Felipe Zipitría) [#2676]
+    - feat: improve and extend cmdline processor to find more evasions (932100 
PL1, 932105 PL1, 932230 PL1, 932150 PL1, 932175 PL1, 932220 PL2, 932240 PL1, 
932106 PL3) (Felipe Zipitría) [#2907]
+    - fix: avoid false positive with certain HTML character entities (932100 
PL1) (Franziska Bühler) [#1954]
+    - feat: move *nix command injection rule 932101, 932106 into the same 
range as the other *nix command injection rules (932231 PL2, 932232 PL3) 
(Felipe Zipitría, Max Leske) [#3092]
+    - feat: extend rule to detect additional *nix commands (932105 PL1) 
(Felipe Zipitría) [#2677]
+    - feat: extend rule to detect mshta in Windows shell commands (932110 PL1) 
(Somdev Sangwan / s0md3v) [#2588]
+    - feat: new Windows commands rules based on lolbas-project replacing 
932110, 932115 (932370 PL1, 932380 PL1) (Felipe Zipitría, Franziska Bühler, 
Max Leske) [#3059, 3170]
+    - fix: avoid false positive on 'sort' (932115 PL1) (Franziska Bühler) 
[#2012]
+    - feat: detect 'Invoke-WebRequest' command (932120 PL1) (Paul Beckett) 
[#2271]
+    - feat: extend rule to detect additional PowerShell cmdlet on Windows 
(932120 PL1) (Pinaki Mondal / 0xInfection) [#2589]
+    - feat: extend rule to detect PowerShell RCEs better via new automation 
(932120 PL1) (Felipe Zipitría) [#2669]
+    - feat: new rule to detect Windows cmdlet aliases (932125 PL1) (Pinaki 
Mondal / 0xInfection) [#2589]
+    - fix: extend rule to detect character class *nix expressions (932130 PL1) 
(Somdev Sangwan / s0md3v, Walter Hop) [#2594]
+    - feat: new rules to detect Log4j / Log4Shell attacks (932131 PL2, 944150 
PL1, 944151 PL2, 944152 PL4) (Christian Folini, Max Leske) [#2349]
+    - fix: prevent false positives against brackets in User-Agent header 
(932131 PL2) (Max Leske) [#3486]
+    - feat: extend rule to detect busybox, $SHELL, and ${SHELL} in *nix RCE 
attacks (932150 PL1) (Walter Hop) [#2728]
+    - feat: extend rule to detect C99 and printf utilities (932150 PL1) (Karel 
Knibbe) [#2569]
+    - feat: extend rule to detect ksh in *nix RCE attacks (932150 PL1) (Andrew 
Howe) [#2721]
+    - feat: extend rule to detect RCE attacks using compression utilities 
(932150 PL1) (Andrew Howe) [#2712]
+    - feat: extend rule to detect RCEs using Base64 evasions (932150 PL1) 
(Somdev Sangwan / s0md3v, Andrew Howe) [#2590]
+    - feat: extend rule to detect RCEs using evasions quotes with python... 
commands (932150 PL1) (Somdev Sangwan / s0md3v, Andrew Howe) [#2590]
+    - feat: new rule to detect generalised *nix RCE (932150 PL2) (Karel 
Knibbe) [#2583]
+    - feat: replace *nix command injection rules 932150 PL1, 932151 PL1 with 
new rules for commands of less than 4 characters and commands of more than 4 
characters in length respectively (932250 PL1, 932260 PL1) (Felipe Zipitría, 
Max Leske) [#3092]
+    - fix: avoid FP on 'time' and 'ping' keywords (932150 PL1) (Walter Hop) 
[#2457]
+    - feat: extend rule to detect RCE better via automation (932160 PL1) 
(Felipe Zipitría) [#2662]
+    - fix: remove unnecessary prefixes from paths in unix-shell.data (932160 
PL1) (Felipe Zipitría) [#2662]
+    - feat: extend rule to detect expre in unix-shell list (932161 PL2) 
(Felipe Zipitría) [#2667]
+    - feat: new rules to detect *nix commands in user-agent and referer 
request headers (932161 PL2, 932237 PL3) (Franziska Bühler, Max Leske, Shivam 
Bathla) [#3132]
+    - feat: new rule detecting alias builtin (932175 PL1) (Felipe Zipitría) 
[#2796]
+    - feat: use new automation to generate restricted-uploads.data from 
restricted-files.data (932180 PL1) (Max Leske) [#3282]
+    - fix: use correct anomaly scoring variable (932180 PL1, 932200 PL2) 
(Jozef Sudolský) [#2324]
+    - feat: detect RCE attempts with uninitialized shell vars (932200 PL2) 
(Andrea Menin) [#2151]
+    - feat: extend rule to detect RCE in user-agent request header (932200 
PL2) (Franziska Bühler, Shivam Bathla) [#3108]
+    - feat: reduce FPs by removing User-Agent from individual target list 
(932200 PL2) (Max Leske) [#3489]
+    - fix: generate correct log entries when using 'MATCHED_VAR_NAME' in 
conjunction with chain rules (932200 PL2, 933120 PL1, 933151 PL2) (Jozef 
Sudolský) [#2347]
+    - fix: new rules to handle referer header and fix false positive (932205 
PL2, 932206 PL2) (Max Leske) [#3300]
+    - feat: extend rule to detect quote evasion (932210 PL2) (Max Leske) 
[#3120]
+    - feat: extend rule to detect sh (932210 PL2) (Franziska Bühler) [#2816]
+    - feat: extend rule to detect SQLi via automation of keyword list updates 
(932210 PL2) (Felipe Zipitría) [#2801]
+    - feat: new rule to detect SQLite system command injection (932210 PL2) 
(flo405, Andrea Menin, Christian Folini) [#2032]
+    - fix: add word boundaries for sh in RCE rules (932230 PL1, 932250 PL1) 
(Max Leske) [#3186]
+    - fix: avoid FPs in RCE detections against words 'environment' and 
'performance' (932230 PL1, 932235 PL1, 932260 PL1, 932236 PL2, 932237 PL3, 
932239 PL2) (Esad Cetiner) [#3477]
+    - fix: handle false positive against sh in *nix command injection attacks 
(932230 PL1, 932250 PL1, 932236 PL2) (Max Leske) [#3186]
+    - feat: add unix commands pyversions and py3versions (932235 PL1, 932260 
PL1, 932236 PL2, 932237 PL3, 932239 PL2) (Jitendra Patro) [#3465]
+    - feat: replace *-with-params.ra files with suffix replacements (932235 
PL1, 932236 PL2, 932239 PL2, 932237 PL3) (Max Leske) [#3331]
+    - fix: prevent FP on keywords 'more' and 'time' in Unix RCE (932235 PL1) 
(Franziska Bühler) [#3488]
+    - fix: reduce FPs at the start of strings by excluding 'as' and 'at' 
(932236 PL2) (Franziska Bühler, Max Leske, Andrew Howe) [#3531
+    - fix: prevent FPs against names due to "axel" and "perl" (932235 PL1, 
932260 PL1, 932236 PL2, 932239 PL2, 932237 PL3) (@superlgn) [#3492]
+    - fix: add whitespace after keywords mail and task to solve false 
positives (932236 PL2) (Franziska Bühler) [#3274]
+    - fix: align unix-shell-upto3* files (932236 PL2) (Max Leske) [#3128]
+    - fix: handle false positives with word "settings" (932236 PL2, 932237 
PL3, 932239 PL2) (Esad Cetiner) [#3394]
+    - fix: prevent FP on keywords more and time in Unix RCE (932236 PL2) 
(Franziska Bühler) [#3487]
+    - fix: solved false positives with creation of word boundaries for 
commonly used words used in *nix RCE rules (932236 PL2) (Max Leske) [#3187]
+    - fix: use correct anomaly scoring variable (932236 PL2) (Ervin Hegedus) 
[#3112]
+    - fix: improve rule by matching non-word-boundary of commands with options 
(932237 PL3) (Max Leske) [#3425]
+    - feat: new rule to detect *nix commands in user-agent and referer request 
headers (932239 PL2) (Franziska Bühler, Shivam Bathla) [#3104, #3318]
+    - fix: reduce FPs in generic quote evasion detection (932240 PL2) (Max 
Leske) [#3494]
+    - fix: remove ARGS_NAME from target variables in (932240 PL2) (Andrea 
Menin) [#2960]
+    - fix: use correct anomaly scoring variables and paranoia level tags 
across for rule (932240 PL2) (Ervin Hegedus) [#2963]
+    - fix: false positives by requiring specific tokens to follow commands 
(932250 PL1) (Max Leske) [#3186]
+    - fix: Added missing target name to logdata (932260 PL1, 932240 PL2) 
(Ervin Hegedus) [#3409]
+    - fix: remove chained rule (932260 PL1) (Max Leske) [#3521]
+    - feat: new rules to detect email protocol attacks (932300 PL2, 932310 
PL2, 932320 PL2) (Felipe Zipitría) [#2322]
++++ 172 more lines (skipped)
++++ between 
/work/SRC/openSUSE:Factory/owasp-modsecurity-crs/owasp-modsecurity-crs.changes
++++ and 
/work/SRC/openSUSE:Factory/.owasp-modsecurity-crs.new.2316/owasp-modsecurity-crs.changes

Old:
----
  owasp-modsecurity-crs-3.3.5.tar.xz

New:
----
  owasp-modsecurity-crs-4.9.0.tar.xz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ owasp-modsecurity-crs.spec ++++++
--- /var/tmp/diff_new_pack.YavWIa/_old  2025-01-28 17:06:18.029256145 +0100
+++ /var/tmp/diff_new_pack.YavWIa/_new  2025-01-28 17:06:18.033256311 +0100
@@ -26,7 +26,7 @@
 %define apache2_serverroot %(%{apxs2} -q PREFIX)
 %define apache2_localstatedir %(%{apxs2} -q LOCALSTATEDIR)
 Name:           owasp-modsecurity-crs
-Version:        3.3.5
+Version:        4.9.0
 Release:        0
 Summary:        OWASP ModSecurity Common Rule Set (CRS)
 License:        Apache-2.0
@@ -62,7 +62,7 @@
 
 %prep
 %setup -q -n coreruleset-%{version}
-sed -i -e '/^#!/c#!%{_bindir}/perl' util/*/*.pl
+sed -i -e '/^#!/c#!%{_bindir}/python3' util/*/*.py
 cp %{SOURCE99} .
 
 %build
@@ -104,16 +104,10 @@
 %license LICENSE
 %dir %{_datadir}/%{name}
 %{_datadir}/%{name}/util
-%attr(0754, root, root) %{_datadir}/%{name}/util/av-scanning/runav.pl
-%attr(0754, root, root) %{_datadir}/%{name}/util/crs2-renumbering/update.py
-%attr(0754, root, root) %{_datadir}/%{name}/util/join-multiline-rules/join.py
-%attr(0754, root, root) 
%{_datadir}/%{name}/util/regexp-assemble/regexp-assemble-v2.pl
-%attr(0754, root, root) 
%{_datadir}/%{name}/util/regexp-assemble/regexp-assemble.pl
-%attr(0754, root, root) 
%{_datadir}/%{name}/util/regexp-assemble/regexp-cmdline.py
-%attr(0754, root, root) %{_datadir}/%{name}/util/send-payload-pls.sh
-%attr(0754, root, root) %{_datadir}/%{name}/util/verify.rb
-%attr(0754, root, root) 
%{_datadir}/%{name}/util/virtual-patching/arachni2modsec.pl
-%attr(0754, root, root) %{_datadir}/%{name}/util/virtual-patching/zap2modsec.pl
+%attr(0754, root, root) %{_datadir}/%{name}/util/crs-rules-check/rules-check.py
+%attr(0754, root, root) 
%{_datadir}/%{name}/util/find-rules-without-test/find-rules-without-test.py
+%attr(0754, root, root) 
%{_datadir}/%{name}/util/php-dictionary-gen/php-dictionary-creator.sh
+%attr(0754, root, root) %{_datadir}/%{name}/util/rule_ctl/rule_ctl.py
 %{_datadir}/%{name}/*.conf*
 %{_datadir}/%{name}/rules
 

++++++ owasp-modsecurity-crs-3.3.5.tar.xz -> owasp-modsecurity-crs-4.9.0.tar.xz 
++++++
++++ 116985 lines of diff (skipped)

Reply via email to