Cool. Thanks.
On Mon, Sep 05, 2016 at 08:05:51AM -0700, Ken Brucker wrote: > Hi Christian, > > Here's a redacted version that includes the C bit minus the content of the > jpg file itself. I've added this to a github issue. > > -- Ken > > --0c41777f-A-- > [05/Sep/2016:06:56:20 --0700] V815hH8AAAEAAFYB3d0AAABQ 192.168.56.1 62686 > 192.16 > 8.56.101 80 > --0c41777f-B-- > POST /picasa_album_uploader/upload HTTP/1.1 > Host: wpdev.local > Accept: */* > Accept-Encoding: gzip > Content-Length: 134956 > Content-Type: multipart/form-data; > boundary=---------------------------482C81C09 > 614 > Cookie: > wordpress_logged_in_bdc5a801bed99bd8e2693412031c90e0=thor%7C1473256578%7 > CqBvxoWnF7B59roUjZK1ypaRxJ6uqqhXJoKkgE1bUfGQ%7C0d1f9bd3868cf2a2df1330248d35e3689 > 623535f486e66910a9700ae4c2c16dd; wordpress_test_cookie=WP+Cookie+check > Connection: keep-alive > User-Agent: Picasa/3.9.141.306 (gzip) > > --0c41777f-C-- > -----------------------------482C81C09614 > Content-Disposition: form-data; name="picasa-album-uploader-upload-images" > Content-Type: text/plain; charset=utf-8 > > 0349e21fed > -----------------------------482C81C09614 > Content-Disposition: form-data; name="_wp_http_referer" > Content-Type: text/plain; charset=utf-8 > > /picasa_album_uploader/minibrowser > -----------------------------482C81C09614 > Content-Disposition: form-data; name="size" > Content-Type: text/plain; charset=utf-8 > > on > -----------------------------482C81C09614 > Content-Disposition: form-data; > name="http://localhost:62667/2d1afc4dac01219e865 > 92ecb3f4a9d8e/image/2fa2bc77befd46db.jpg?size=1024"; filename="IMG_6822.JPG" > Content-Type: image/jpeg > > [ Redacted ] > > -----------------------------482C81C09614 > Content-Disposition: form-data; name="title[]" > Content-Type: text/plain; charset=utf-8 > > IMG_6822.JPG > -----------------------------482C81C09614 > Content-Disposition: form-data; name="caption[]" > Content-Type: text/plain; charset=utf-8 > > > -----------------------------482C81C09614 > Content-Disposition: form-data; name="description[]" > Content-Type: text/plain; charset=utf-8 > > Deer in Austin > -----------------------------482C81C09614-- > > --0c41777f-F-- > HTTP/1.1 403 Forbidden > Content-Length: 237 > Connection: close > Content-Type: text/html; charset=iso-8859-1 > > --0c41777f-H-- > Message: Warning. Pattern match "['\";=]" at > FILES_NAMES:http://localhost:62667/ > 2d1afc4dac01219e86592ecb3f4a9d8e/image/2fa2bc77befd46db.jpg?size=1024. [file > "/vagrant/owasp-modsecurity-crs/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] > [line "108"] [id "920120"] [rev "1"] [msg "Attempted multipart/form-data > bypass"] [data > "http://localhost:62667/2d1afc4dac01219e86592ecb3f4a9d8e/image/2fa2bc77befd46db.jpg?size=1024"] > [severity "CRITICAL"] [ver "OWASP_CRS/3.0.0"] [maturity "9"] [accuracy "7"] > [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag > "attack-protocol"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/INVALID_REQ"] [tag > "CAPEC-272"] > Message: Access denied with code 403 (phase 2). Operator GE matched 5 at > TX:anomaly_score. [file > "/vagrant/owasp-modsecurity-crs/rules/REQUEST-949-BLOCKING-EVALUATION.conf"] > [line "53"] [id "949110"] [msg "Inbound Anomaly Score Exceeded (Total Score: > 5)"] [severity "CRITICAL"] [tag "application-multi"] [tag "language-multi"] > [tag "platform-multi"] [tag "attack-generic"] > Message: Warning. Operator GE matched 5 at TX:inbound_anomaly_score. [file > "/vagrant/owasp-modsecurity-crs/rules/RESPONSE-980-CORRELATION.conf"] [line > "73"] [id "980130"] [msg "Inbound Anomaly Score Exceeded (Total Inbound > Score: 5 - SQLI=0,XSS=0,RFI=0,LFI=0,RCE=0,PHPI=0,HTTP=0,SESS=0): Attempted > multipart/form-data bypass"] [tag "event-correlation"] > Apache-Error: [file "apache2_util.c"] [line 271] [level 3] [client %s] > ModSecurity: %s%s [uri "%s"]%s > Apache-Error: [file "apache2_util.c"] [line 271] [level 3] [client %s] > ModSecurity: %s%s [uri "%s"]%s > Apache-Error: [file "apache2_util.c"] [line 271] [level 3] [client %s] > ModSecurity: %s%s [uri "%s"]%s > Action: Intercepted (phase 2) > Stopwatch: 1473083780329702 6475 (- - -) > Stopwatch2: 1473083780329702 6475; combined=2451, p1=208, p2=2078, p3=0, > p4=0, p5=164, sr=26, sw=1, l=0, gc=0 > Producer: ModSecurity for Apache/2.9.1 (http://www.modsecurity.org/); > OWASP_CRS/3.0.0. > Server: Apache/2.4.23 (Ubuntu) > Engine-Mode: "ENABLED" > > --0c41777f-J-- > 4,133750,"IMG_6822.JPG","<Unknown ContentType>" > Total,133750 > > --0c41777f-Z-- > > > > On Sep 5, 2016, at 4:09 AM, Christian Folini <christian.fol...@netnea.com> > > wrote: > > > > Hello Ken, > > > > Classical False Positive. > > > > You have your audit log parts configured to include only the I part. > > I think the uploaded filename in question is > > http://localhost:63391/d8edaf7f8a66068039906ecb9d04c451/image/7c2c6d05f122032b.jpg?size=1024 > > > > But could you please show us the C part - or dump the full traffic, > > we this becomes visible. > > > > And then, would you please open an issue on github for this? > > > > Cheers, > > > > Christian > > > > On Sun, Sep 04, 2016 at 08:26:37AM -0700, Ken Brucker wrote: > >> Playing with OWASP CRS v3.0 and have a false positive on rule 920120. > >> > >> The application is Picasa (no longer available from Google). During file > >> uploads it produces the failing pattern when communicating with the target > >> website. I have no control over the application end of this and there's no > >> hope for a fix from Google since they have dropped the product. It does > >> still work however so I continue to use it. > >> > >> I'm disabling this rule for this user agent using: > >> > >> SecRule REQUEST_HEADERS:User-Agent "@beginsWith Picasa/3." > >> "id:1010,phase:1,t:none,nolog,pass,ctl:ruleRemoveById=920120" > >> > >> > >> Here's the entry from the audit log: > >> > >> --93ede52c-A-- > >> [04/Sep/2016:07:57:20 --0700] V8w2UH8AAAEAADHQvy0AAABV 192.168.56.1 64619 > >> 192.16 > >> 8.56.101 80 > >> --93ede52c-B-- > >> POST /picasa_album_uploader/upload HTTP/1.1 > >> Host: wpdev.local > >> Accept: */* > >> Accept-Encoding: gzip > >> Content-Length: 117779 > >> Content-Type: multipart/form-data; > >> boundary=---------------------------98E77E01B > >> 348 > >> Cookie: > >> wordpress_logged_in_bdc5a801bed99bd8e2693412031c90e0=thor%7C1473173832%7 > >> COzgZxmia5N6cIlq8cByzDuXNOUtUG8ksqAsyHg12XMA%7Cd70c349c19dfc0274e629711840a30937 > >> a640e3c6f07362d76dab9bac3b58e68; wordpress_test_cookie=WP+Cookie+check > >> Connection: keep-alive > >> User-Agent: Picasa/3.9.141.306 (gzip) > >> > >> --93ede52c-I-- > >> picasa%2dalbum%2duploader%2dupload%2dimages=48fd37703c&%5fwp%5fhttp%5freferer=%2 > >> fpicasa%5falbum%5fuploader%2fminibrowser&size=on&title%5b%5d=IMG%5f5306%2eJPG&ca > >> ption%5b%5d=&description%5b%5d= > >> --93ede52c-F-- > >> HTTP/1.1 403 Forbidden > >> Content-Length: 237 > >> Connection: close > >> Content-Type: text/html; charset=iso-8859-1 > >> > >> --93ede52c-E-- > >> > >> --93ede52c-H-- > >> Message: Warning. Pattern match "['\";=]" at > >> FILES_NAMES:http://localhost:63391/ > >> d8edaf7f8a66068039906ecb9d04c451/image/7c2c6d05f122032b.jpg?size=1024. > >> [file "/v > >> agrant/owasp-modsecurity-crs/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] > >> [line > >> "108"] [id "920120"] [rev "1"] [msg "Attempted multipart/form-data > >> bypass"] [da > >> ta > >> "http://localhost:63391/d8edaf7f8a66068039906ecb9d04c451/image/7c2c6d05f12203 > >> 2b.jpg?size=1024"] [severity "CRITICAL"] [ver "OWASP_CRS/3.0.0"] [maturity > >> "9"] > >> [accuracy "7"] [tag "application-multi"] [tag "language-multi"] [tag > >> "platform-m > >> ulti"] [tag "attack-protocol"] [tag > >> "OWASP_CRS/PROTOCOL_VIOLATION/INVALID_REQ"] > >> [tag "CAPEC-272"] > >> Message: Access denied with code 403 (phase 2). Operator GE matched 5 at > >> TX:anom > >> aly_score. [file > >> "/vagrant/owasp-modsecurity-crs/rules/REQUEST-949-BLOCKING-EVAL > >> UATION.conf"] [line "53"] [id "949110"] [msg "Inbound Anomaly Score > >> Exceeded (To > >> tal Score: 5)"] [severity "CRITICAL"] [tag "application-multi"] [tag > >> "language-m > >> ulti"] [tag "platform-multi"] [tag "attack-generic"] > >> Message: Warning. Operator GE matched 5 at TX:inbound_anomaly_score. [file > >> "/vag > >> rant/owasp-modsecurity-crs/rules/RESPONSE-980-CORRELATION.conf"] [line > >> "73"] [id > >> "980130"] [msg "Inbound Anomaly Score Exceeded (Total Inbound Score: 5 - > >> SQLI=0 > >> ,XSS=0,RFI=0,LFI=0,RCE=0,PHPI=0,HTTP=0,SESS=0): Attempted > >> multipart/form-data by > >> pass"] [tag "event-correlation"] > >> Apache-Error: [file "apache2_util.c"] [line 271] [level 3] [client %s] > >> ModSecuri > >> ty: %s%s [uri "%s"]%s > >> Apache-Error: [file "apache2_util.c"] [line 271] [level 3] [client %s] > >> ModSecuri > >> ty: %s%s [uri "%s"]%s > >> Apache-Error: [file "apache2_util.c"] [line 271] [level 3] [client %s] > >> ModSecuri > >> ty: %s%s [uri "%s"]%s > >> Action: Intercepted (phase 2) > >> Stopwatch: 1473001040658089 39084 (- - -) > >> Stopwatch2: 1473001040658089 39084; combined=2811, p1=201, p2=2420, p3=0, > >> p4=0, > >> p5=189, sr=27, sw=1, l=0, gc=0 > >> Response-Body-Transformed: Dechunked > >> Producer: ModSecurity for Apache/2.9.1 (http://www.modsecurity.org/); > >> OWASP_CRS/ > >> 3.0.0. > >> Server: Apache/2.4.23 (Ubuntu) > >> Engine-Mode: "ENABLED" > >> > >> --93ede52c-J-- > >> 4,116587,"IMG_5306.JPG","<Unknown ContentType>" > >> Total,116587 > >> > >> --93ede52c-Z-- > >> > >> -- Ken > > > >> _______________________________________________ > >> Owasp-modsecurity-core-rule-set mailing list > >> Owasp-modsecurity-core-rule-set@lists.owasp.org > >> https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set > > > > > > -- > > https://www.feistyduck.com/training/modsecurity-training-course > > mailto:christian.fol...@netnea.com > > twitter: @ChrFolini > _______________________________________________ Owasp-modsecurity-core-rule-set mailing list Owasp-modsecurity-core-rule-set@lists.owasp.org https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set