@@ -612,6 +612,40 @@ SecRule FILES|REQUEST_HEADERS:X-Filename|REQUEST_HEADERS:X_Filename|REQUEST_HEAD
612
612
setvar:'tx.lfi_score=+%{tx.critical_anomaly_score}',\
613
613
setvar:'tx.anomaly_score_pl1=+%{tx.critical_anomaly_score}'"
614
614
615
+ #
616
+ # -=[ Rule 932200 ]=-
617
+ #
618
+ # Intercept RCE Bypass using uninitialized variables
619
+ # Refer to: https://www.secjuice.com/web-application-firewall-waf-evasion/
620
+ #
621
+ # Examples:
622
+ # - foo;cat$u/etc$u/passwd
623
+ # - bar;cd+/etc;/bin$u/ca*+passwd
624
+ #
625
+ # (remove this line) Regex notes: https://regex101.com/r/JgZFRi/2/
626
+ #
627
+ SecRule REQUEST_COOKIES|!REQUEST_COOKIES:/__utm/|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/* "@rx (?:bin|boot|dev|etc|home|lib|media|mnt|opt|proc|root|run|sbin|srv|sys|tmp|usr|var|[a-z]\*|\*[a-z]+)\$[a-zA-Z@]" \
628
+ "id:932200,\
629
+ phase:2,\
630
+ block,\
631
+ capture,\
632
+ t:none,t:lowercase,\
633
+ msg:'RCE Bypass using Uninitialized Variable',\
634
+ logdata:'Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}',\
635
+ tag:'application-multi',\
636
+ tag:'language-multi',\
637
+ tag:'platform-multi',\
638
+ tag:'attack-rce',\
639
+ tag:'OWASP_CRS',\
640
+ tag:'OWASP_CRS/WEB_ATTACK/COMMAND_INJECTION',\
641
+ tag:'WASCTC/WASC-31',\
642
+ tag:'OWASP_TOP_10/A1',\
643
+ tag:'PCI/6.5.2',\
644
+ ver:'OWASP_CRS/3.2.0',\
645
+ severity:'CRITICAL',\
646
+ setvar:'tx.lfi_score=+%{tx.critical_anomaly_score}',\
647
+ setvar:'tx.anomaly_score_pl1=+%{tx.critical_anomaly_score}'"
648
+
615
649
616
650
SecRule TX:EXECUTING_PARANOIA_LEVEL "@lt 2" "id:932013,phase:1,pass,nolog,skipAfter:END-REQUEST-932-APPLICATION-ATTACK-RCE"
617
651
SecRule TX:EXECUTING_PARANOIA_LEVEL "@lt 2" "id:932014,phase:2,pass,nolog,skipAfter:END-REQUEST-932-APPLICATION-ATTACK-RCE"
0 commit comments