Skip to content
This repository was archived by the owner on May 14, 2020. It is now read-only.

Commit 58d4abc

Browse files
author
Menin Andrea
committed
932200 PL1 RCE bypass uninitialized var
1 parent 5c2feb7 commit 58d4abc

File tree

1 file changed

+34
-0
lines changed

1 file changed

+34
-0
lines changed

rules/REQUEST-932-APPLICATION-ATTACK-RCE.conf

+34
Original file line numberDiff line numberDiff line change
@@ -612,6 +612,40 @@ SecRule FILES|REQUEST_HEADERS:X-Filename|REQUEST_HEADERS:X_Filename|REQUEST_HEAD
612612
setvar:'tx.lfi_score=+%{tx.critical_anomaly_score}',\
613613
setvar:'tx.anomaly_score_pl1=+%{tx.critical_anomaly_score}'"
614614

615+
#
616+
# -=[ Rule 932200 ]=-
617+
#
618+
# Intercept RCE Bypass using uninitialized variables
619+
# Refer to: https://www.secjuice.com/web-application-firewall-waf-evasion/
620+
#
621+
# Examples:
622+
# - foo;cat$u/etc$u/passwd
623+
# - bar;cd+/etc;/bin$u/ca*+passwd
624+
#
625+
# (remove this line) Regex notes: https://regex101.com/r/JgZFRi/2/
626+
#
627+
SecRule REQUEST_COOKIES|!REQUEST_COOKIES:/__utm/|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/* "@rx (?:bin|boot|dev|etc|home|lib|media|mnt|opt|proc|root|run|sbin|srv|sys|tmp|usr|var|[a-z]\*|\*[a-z]+)\$[a-zA-Z@]" \
628+
"id:932200,\
629+
phase:2,\
630+
block,\
631+
capture,\
632+
t:none,t:lowercase,\
633+
msg:'RCE Bypass using Uninitialized Variable',\
634+
logdata:'Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}',\
635+
tag:'application-multi',\
636+
tag:'language-multi',\
637+
tag:'platform-multi',\
638+
tag:'attack-rce',\
639+
tag:'OWASP_CRS',\
640+
tag:'OWASP_CRS/WEB_ATTACK/COMMAND_INJECTION',\
641+
tag:'WASCTC/WASC-31',\
642+
tag:'OWASP_TOP_10/A1',\
643+
tag:'PCI/6.5.2',\
644+
ver:'OWASP_CRS/3.2.0',\
645+
severity:'CRITICAL',\
646+
setvar:'tx.lfi_score=+%{tx.critical_anomaly_score}',\
647+
setvar:'tx.anomaly_score_pl1=+%{tx.critical_anomaly_score}'"
648+
615649

616650
SecRule TX:EXECUTING_PARANOIA_LEVEL "@lt 2" "id:932013,phase:1,pass,nolog,skipAfter:END-REQUEST-932-APPLICATION-ATTACK-RCE"
617651
SecRule TX:EXECUTING_PARANOIA_LEVEL "@lt 2" "id:932014,phase:2,pass,nolog,skipAfter:END-REQUEST-932-APPLICATION-ATTACK-RCE"

0 commit comments

Comments
 (0)