Rule 921110
See original GitHub issueAudit Logs / Triggered Rule Numbers
FP can be easily triggered, for example, with this text in any POST field (realworld example from music forum):
DJ Wich - soundtrack Gympl
anything other here so previous line ends with EOL
On HTTP Request Smuggling webpage ( http://projects.webappsec.org/HTTP-Request-Smuggling ), example of exploitation is using two Content-Length headers. Is there any other way how to exploit this? If not, we should add something like this to the rule:
SecRule &REQUEST_HEADERS_NAMES:Content-Length "@ge 1"
EDIT: Seems explotation is possible also by other ways, see: https://www.cgisecurity.com/lib/HTTP-Request-Smuggling.pdf
Your Environment
- CRS version (e.g., v3.2.0): 3.3.0
- Paranoia level setting: PL1
- ModSecurity version (e.g., 2.9.3): 2.9.3
- Web Server and version (e.g., apache 2.4.41): 2.4.25
- Operating System and version: Debian Stretch
Confirmation
[x] I have removed any personal data (email addresses, IP addresses, passwords, domain names) from any logs posted.
Issue Analytics
- State:
- Created 3 years ago
- Comments:19 (19 by maintainers)
Top Results From Across the Web
False positive for rule 921110 · Issue #2054 - GitHub
Description Uploading an xml containing text budget foo) \n triggers this false positive. Audit Logs / Triggered Rule Numbers Rule ID: 921110 ...
Read more >ModSecurity CRS Rule Group 921 Protocol Attacks - HeatShield
921110 HTTP Request Smuggling Attack. 921180 checks if any multiple parameter counter is > 1. 921170 counts multiple parameters with the same name....
Read more >OWASP ModSecurity Core Rule Set v3.3.0 Release ...
The OWASP ModSecurity Core Rule Set team is proud to announce the release ... Prevent bypass of rule 921110 (Amit Klein, Franziska Bühler) ......
Read more >What are the different terms that are blocked by ModSecurity ...
The entry means the rule id 921110 has been violated. This rule id means ModSecurity has classified the request data as an attempt...
Read more >Core Rule Set Inventory – Welcome to netnea
Rule ID Paranoia Level Severity
901001 PL1 none
901450 PL1 none
905100 PL1 none
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
Actually, I forgot about the
HTTP/1.1
part in this:Does this look right? I also added HTTPS checks.
@airween, even with your update,
multipart/form-data
results in a lot of false positives. Some are below.What do you think of this rule? It removes the HTTP/0.9 version check, but maybe that can be put into a separate rule that can be enabled if HTTP/0.9 is enabled.