Created
February 6, 2020 10:12
-
-
Save asterite3/73185d0f3fa7686a871a5da54e304f0c to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
SecRuleEngine On | |
SecAction \ | |
"id:1,\ | |
phase:1,\ | |
pass,\ | |
nolog,\ | |
t:none,\ | |
setvar:'tx.anomaly_score_pl1=0'" | |
SecRule &TX:critical_anomaly_score "@eq 0" \ | |
"id:901140,\ | |
phase:1,\ | |
pass,\ | |
nolog,\ | |
setvar:'tx.critical_anomaly_score=5'" | |
# Default HTTP policy: allowed_request_content_type (rule 900220) | |
SecRule &TX:allowed_request_content_type "@eq 0" \ | |
"id:901162,\ | |
phase:1,\ | |
pass,\ | |
nolog,\ | |
setvar:'tx.allowed_request_content_type=application/x-www-form-urlencoded|multipart/form-data|text/xml|application/xml|application/soap+xml|application/x-amf|application/json|application/octet-stream|application/csp-report|application/xss-auditor-report|text/plain'" | |
# Default HTTP policy: allowed_request_content_type_charset (rule 900270) | |
SecRule &TX:allowed_request_content_type_charset "@eq 0" \ | |
"id:901168,\ | |
phase:1,\ | |
pass,\ | |
nolog,\ | |
setvar:'tx.allowed_request_content_type_charset=utf-8|iso-8859-1|iso-8859-15|windows-1252'" | |
SecRule REQUEST_FILENAME "@contains /remote.php/dav/files/" \ | |
"id:9003110,\ | |
phase:2,\ | |
pass,\ | |
t:none,\ | |
nolog,\ | |
setvar:'tx.allowed_request_content_type=%{tx.allowed_request_content_type}|text/vcard'" | |
SecRule REQUEST_METHOD "@rx ^(?:PUT|MOVE)$" \ | |
"id:9003115,\ | |
phase:2,\ | |
pass,\ | |
t:none,\ | |
nolog,\ | |
chain" | |
SecRule REQUEST_FILENAME "@rx /remote\.php/dav/(?:files|uploads)/" \ | |
"setvar:'tx.allowed_request_content_type=%{tx.allowed_request_content_type}|application/octet-stream'" | |
SecRule REQUEST_HEADERS:Content-Type "@rx ^[^;\s]+" \ | |
"id:920420,\ | |
phase:2,\ | |
block,\ | |
capture,\ | |
t:none,\ | |
msg:'Request content type is not allowed by policy',\ | |
logdata:'%{MATCHED_VAR}',\ | |
tag:'application-multi',\ | |
tag:'language-multi',\ | |
tag:'platform-multi',\ | |
tag:'attack-protocol',\ | |
tag:'paranoia-level/1',\ | |
tag:'OWASP_CRS',\ | |
tag:'OWASP_CRS/POLICY/CONTENT_TYPE_NOT_ALLOWED',\ | |
tag:'WASCTC/WASC-20',\ | |
tag:'OWASP_TOP_10/A1',\ | |
tag:'OWASP_AppSensor/EE2',\ | |
tag:'PCI/12.1',\ | |
ver:'OWASP_CRS/3.2.0',\ | |
severity:'CRITICAL',\ | |
chain" | |
SecRule TX:0 "!@rx ^%{tx.allowed_request_content_type}$" \ | |
"t:none,\ | |
ctl:forceRequestBodyVariable=On,\ | |
setvar:'tx.anomaly_score_pl1=+%{tx.critical_anomaly_score}'" | |
SecRule REQUEST_HEADERS:Content-Type "@rx charset\s*=\s*[\"']?([^;\"'\s]+)" \ | |
"id:920480,\ | |
phase:1,\ | |
block,\ | |
capture,\ | |
t:none,t:lowercase,\ | |
msg:'Request content type charset is not allowed by policy',\ | |
logdata:'%{MATCHED_VAR}',\ | |
tag:'application-multi',\ | |
tag:'language-multi',\ | |
tag:'platform-multi',\ | |
tag:'attack-protocol',\ | |
tag:'paranoia-level/1',\ | |
tag:'OWASP_CRS',\ | |
tag:'OWASP_CRS/PROTOCOL_VIOLATION/CONTENT_TYPE_CHARSET',\ | |
tag:'WASCTC/WASC-20',\ | |
tag:'OWASP_TOP_10/A1',\ | |
tag:'OWASP_AppSensor/EE2',\ | |
tag:'PCI/12.1',\ | |
ver:'OWASP_CRS/3.2.0',\ | |
severity:'CRITICAL',\ | |
chain" | |
SecRule TX:1 "!@rx ^%{tx.allowed_request_content_type_charset}$" \ | |
"t:none,\ | |
ctl:forceRequestBodyVariable=On,\ | |
setvar:'tx.anomaly_score_pl1=+%{tx.critical_anomaly_score}'" |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment