RCE detection bypass at PL1
See original GitHub issue_Issue originally created by user dune73 on date 2019-08-19 07:06:16. Link to original issue: https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1513._
The following bypass was pasted on twitter.
{ 1 }; ;+$u+cat+/etc$u/passwd$u
{ 2 }; ;+$u+cat+/etc$u/passwd+\#
https://twitter.com/spyerror/status/1162826904833089541?s=19
According to franbuehler, this passes on PL1, but is being detected on PL2.
Type of Issue
RCE rule detection bypass
Description
See above.
Your Environment
CRS 3.1
Confirmation
[X] I have removed any personal data (email addresses, IP addresses, passwords, domain names) from any logs posted.
Issue Analytics
- State:
- Created 3 years ago
- Comments:7 (1 by maintainers)
Top Results From Across the Web
ImpressCMS: from unauthenticated SQL injection to RCE
In this blog post we will see how to bypass such a security mechanism to exploit a couple vulnerabilities I discovered about a...
Read more >Web Application Firewall (WAF) Evasion Techniques - Medium
All moderns Web Application Firewall are able to intercept (and even block) RCE attempts, but when it happens in a Linux system we've...
Read more >How the CRS protects the vulnerable web application Pixi by ...
It says that the access was denied (id: 949110) and that the Inbound Anomaly Score of the request at PL1 was 5 (id:...
Read more >Volume 22 – Number 37 | SANS @RISK - SANS Institute
Title: SQL injection bypass vulnerability in Modsecurity owasp-modsecurity-crs ... 3.2.0 (Paranoia level at PL1) has a SQL injection bypass vulnerability.
Read more >CVE - Search Results - MITRE
The multipart payload will therefore bypass detection. ... owasp-modsecurity-crs 3.2.0 (Paranoia level at PL1) has a SQL injection bypass vulnerability.
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
User marcstern commented on date 2019-08-20 06:30:12:
This evasion technique (and several others) can be defeated with the t:bash transformation - see https://www.approach.be/en/modsecurity.html
User franbuehler commented on date 2019-08-19 07:34:37:
First command gets the following scores:
individual paranoia level scores: 0, 13, 11, 13
Second command:
individual paranoia level scores: 0, 18, 11, 13