Skip to content
This repository was archived by the owner on May 14, 2020. It is now read-only.

Commit f696c66

Browse files
committed
Merge branch 'v3.2/dev' into v3.3/dev
2 parents d390c92 + 2a6361d commit f696c66

File tree

134 files changed

+2408
-2400
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

134 files changed

+2408
-2400
lines changed

CHANGES

Lines changed: 15 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
or the CRS mailinglist at
66
* https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set
77

8-
== Version 3.2.0 - 9/20/2019 ==
8+
== Version 3.2.0 - 9/24/2019 ==
99

1010
New functionality:
1111
* Add AngularJS client side template injection 941380 PL2 (Franziska Bühler)
@@ -14,6 +14,7 @@ New functionality:
1414
* Add libinjection check on last path segment (Max Leske, Christian Folini)
1515
* Add PUBLIC identifier for XML entities (#1490) (Rufus125)
1616
* Add .rdb to default restricted_extensions (Walter Hop)
17+
* Add .swp to default restricted_extensions (Andrea Menin)
1718
* Add rule 933200 PHP Wrappers (Andrea Menin)
1819
* Add send-payload-pls.sh script to test payload against multiple paranoia levels (Christian Folini)
1920
* Add support for shell evasions with $IFS (Walter Hop, Chaim Sanders)
@@ -50,19 +51,23 @@ Improved compatibility:
5051
Fixes and improvements:
5152
* 932140: fix ReDoS in FOR expression (Walter Hop)
5253
* 933200: Simplify pattern (Federico G. Schwindt, Andrea Menin)
54+
* 941380: fix anomaly score variable (Franziska Bühler)
55+
* 942510, 942511: fix anomaly score variable (Walter Hop)
5356
* Add content-type application/csp-report (Andrea Menin)
5457
* Add content-type application/xss-auditor-report (Andrea Menin)
5558
* Add CRS 3.2 Badge build support. (Chaim Sanders)
59+
* Add CVE numbers for Apache Struts vulnerabilities to comments in rules (Franziska Bühler)
5660
* Add CVE-2018-11776 to comments of 933160 and 933161 (Franziska Bühler)
5761
* Add CVE-2018-2380 to comments of rules (Franziska Bühler)
58-
* Add CVE numbers for Apache Struts vulnerabilities to comments in rules (Franziska Bühler)
5962
* Add default env vars for anomaly scores in Docker (Franziska Bühler)
60-
* Added spaces in front of closing square brackets (Franziska Bühler)
61-
* Adding travis changes (#1316) (Chaim Sanders)
6263
* Add missing OWASP_CRS tags to 921xxx rules (Walter Hop)
6364
* Add REQUEST_FILENAME to rule id 944130 and add exploits to comment (Franziska Bühler)
65+
* Add spaces in front of closing square brackets (Franziska Bühler)
66+
* Add travis changes (#1316) (Chaim Sanders)
6467
* Allow dot characters in Content-Type multipart boundary (Walter Hop)
6568
* Also handle dot variant of X_Filename. PHP will transform dots to underscore in variable names since dot is invalid. (Federico G. Schwindt)
69+
* As per the ref manual, it is compressWhitespace (Federico G. Schwindt)
70+
* Avoid php leak false positive with WOFF files (Manuel Spartan)
6671
* Bring back CRS 2.x renumbering utility (Walter Hop)
6772
* Clean up travis and reorg (Federico G. Schwindt)
6873
* Code cosmetics: reorder the actions of rules (Ervin Hegedus)
@@ -96,6 +101,8 @@ Fixes and improvements:
96101
* Fix Travis Merge not being able to find HEAD (Chaim Sanders)
97102
* Fix vulnerable regexp in rule 942490 (CVE-2019-11387) (Christoph Hansen)
98103
* Fix wrong regex, assembly result, in 942370 (Franziska Bühler)
104+
* INSTALL: advise to use release zips, remove upgrade.py, update Nginx (Walter Hop)
105+
* Java: change tag from COMMAND_INJECTION to JAVA_INJECTION (Manuel Spartan)
99106
* Jwall auditconsole outbound anomaly scoring requirements (Christoph Hansen)
100107
* Mark patterns not supported by re2 (Federico G. Schwindt)
101108
* Move duplicated 900270 to 900280 Fixes #1236. (Federico G. Schwindt)
@@ -117,11 +124,11 @@ Fixes and improvements:
117124
* SQLI: removed unnecessary + (Christoph Hansen)
118125
* Switch Docker image to owasp/modsecurity:2.9-apache-ubuntu (Federico G. Schwindt)
119126
* unix-shell.data: fix typo in 'more' (Walter Hop)
127+
* Update .travis.yml Update to support v3.1 (Chaim Sanders)
120128
* Update dockerfile to always use 3.2/dev (Federico G. Schwindt)
121129
* Update OWASP CRS Docker image to support the new upstream and 2.9.3 (Peter Bittner, Chaim Sanders)
122130
* Update RESPONSE-950-DATA-LEAKAGES.conf (Christoph Hansen)
123131
* Update RESPONSE-959-BLOCKING-EVALUATION.conf (Christoph Hansen)
124-
* Update .travis.yml Update to support v3.1 (Chaim Sanders)
125132
* Wordpress: add support for Gutenberg editor (siric_, Walter Hop)
126133
* Wordpress: allow searching for any term in admin posts/pages overview (Walter Hop)
127134
* WordPress: exclude Gutenberg via rest_route (Walter Hop)
@@ -133,7 +140,6 @@ Unit tests:
133140
* 932140: add regression tests (Walter Hop)
134141
* 933180: fix tests which were doing nothing (Walter Hop)
135142
* 941370: add some more tests, fix whitespace (Walter Hop)
136-
* Added regression tests for rules 942320, 942360, 942361, 942210, 942380, 942410, 942470, 942120, 942240, 942160, 942190, 942140, 942490, 942120 (Christoph Hansen)
137143
* Add more tests for 941130 (Christian Folini)
138144
* Add regression test for 941101 (Avery Wong)
139145
* Add regression tests for 942150, 942100, 942260 (Christian Folini)
@@ -142,10 +148,13 @@ Unit tests:
142148
* Add testing support for libmodsecurity running on Apache and Nginx (Chaim Sanders)
143149
* Add tests for 941360 that fights JSFuck and Hieroglyphy (Christian Folini)
144150
* Add tests for rule 921110 (Yu Yagihashi)
151+
* Added regression tests for rules 942320, 942360, 942361, 942210, 942380, 942410, 942470, 942120, 942240, 942160, 942190, 942140, 942490, 942120 (Christoph Hansen)
145152
* Drop tests for removed rules (Federico G. Schwindt)
153+
* Fix failing regression tests (Ervin Hegedus)
146154
* Fix failing tests (Manuel Spartan, Chaim Sanders)
147155
* Fix readme typos in example rule (Walter Hop)
148156
* Fix test 941110-2 (Federico G. Schwindt)
157+
* Fix YAML 1.2 compliance with "true" (Federico G. Schwindt)
149158
* RCE: Add tests for the for command (Federico G. Schwindt)
150159
* Update regression tests for rules 931110, 931120, 931130 (Simon Studer)
151160

util/docker/docker-compose.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ services:
7474
- ./RESPONSE-999-EXCLUSION-RULES-AFTER-CRS.conf:/etc/modsecurity.d/owasp-crs/rules/RESPONSE-999-EXCLUSION-RULES-AFTER-CRS.conf
7575

7676
#######################################################
77-
# Add TLS server certificate and key
77+
# Add TLS server certificate and key
7878
# (only available if SETPROXY was enabled during the
7979
# parent ModSecurity image)
8080
#######################################################
Lines changed: 37 additions & 37 deletions
Original file line numberDiff line numberDiff line change
@@ -1,56 +1,56 @@
11
---
2-
meta:
2+
meta:
33
author: "csanders-git"
44
enabled: true
55
name: "911100.yaml"
66
description: "Description"
7-
tests:
8-
-
7+
tests:
8+
-
99
test_title: 911100-1
10-
stages:
11-
-
12-
stage:
10+
stages:
11+
-
12+
stage:
1313
input:
1414
dest_addr: "127.0.0.1"
1515
port: 80
1616
headers:
1717
User-Agent: "ModSecurity CRS 3 Tests"
1818
Host: "localhost"
19-
output:
19+
output:
2020
no_log_contains: "id \"911100\""
21-
-
21+
-
2222
test_title: 911100-2
23-
stages:
24-
-
25-
stage:
23+
stages:
24+
-
25+
stage:
2626
input:
2727
dest_addr: "127.0.0.1"
2828
port: 80
2929
method: "OPTIONS"
3030
headers:
3131
User-Agent: "ModSecurity CRS 3 Tests"
3232
Host: "localhost"
33-
output:
33+
output:
3434
no_log_contains: "id \"911100\""
35-
-
35+
-
3636
test_title: 911100-3
37-
stages:
38-
-
39-
stage:
37+
stages:
38+
-
39+
stage:
4040
input:
4141
dest_addr: "127.0.0.1"
4242
method: "HEAD"
4343
port: 80
4444
headers:
4545
User-Agent: "ModSecurity CRS 3 Tests"
4646
Host: "localhost"
47-
output:
48-
no_log_contains: "id \"911100\""
49-
-
47+
output:
48+
no_log_contains: "id \"911100\""
49+
-
5050
test_title: 911100-4
51-
stages:
52-
-
53-
stage:
51+
stages:
52+
-
53+
stage:
5454
input:
5555
dest_addr: "127.0.0.1"
5656
method: "POST"
@@ -60,27 +60,27 @@
6060
Host: "localhost"
6161
Content-Type: "application/x-www-form-urlencoded"
6262
data: "test=value"
63-
output:
64-
no_log_contains: "id \"911100\""
65-
-
63+
output:
64+
no_log_contains: "id \"911100\""
65+
-
6666
test_title: 911100-5
67-
stages:
68-
-
69-
stage:
67+
stages:
68+
-
69+
stage:
7070
input:
7171
dest_addr: "127.0.0.1"
7272
method: "TEST"
7373
port: 80
7474
headers:
7575
User-Agent: "ModSecurity CRS 3 Tests"
7676
Host: "localhost"
77-
output:
78-
log_contains: "id \"911100\""
79-
-
77+
output:
78+
log_contains: "id \"911100\""
79+
-
8080
test_title: 911100-6
8181
desc: Method is not allowed by policy (911100) from old modsec regressions
8282
stages:
83-
-
83+
-
8484
stage:
8585
input:
8686
dest_addr: 127.0.0.1
@@ -100,11 +100,11 @@
100100
output:
101101
log_contains: id "911100"
102102

103-
-
103+
-
104104
test_title: 911100-7
105105
desc: Method is not allowed by policy (911100) from old modsec regressions
106106
stages:
107-
-
107+
-
108108
stage:
109109
input:
110110
dest_addr: 127.0.0.1
@@ -124,11 +124,11 @@
124124
output:
125125
log_contains: id "911100"
126126

127-
-
127+
-
128128
test_title: 911100-8
129129
desc: Method is not allowed by policy (911100) from old modsec regressions
130130
stages:
131-
-
131+
-
132132
stage:
133133
input:
134134
dest_addr: 127.0.0.1
@@ -146,4 +146,4 @@
146146
uri: /
147147
version: HTTP/1.0
148148
output:
149-
log_contains: id "911100"
149+
log_contains: id "911100"

util/regression-tests/tests/REQUEST-913-SCANNER-DETECTION/913100.yaml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,11 @@
55
enabled: true
66
name: 913100.yaml
77
tests:
8-
-
8+
-
99
test_title: 913100-1
1010
desc: Request Indicates a Security Scanner Scanned the Site (913100) from old modsec regressions
1111
stages:
12-
-
12+
-
1313
stage:
1414
input:
1515
dest_addr: 127.0.0.1
@@ -29,11 +29,11 @@
2929
version: HTTP/1.0
3030
output:
3131
log_contains: id "913100"
32-
-
32+
-
3333
test_title: 913100-2
3434
desc: Request Indicates a Security Scanner Scanned the Site (913100) from old modsec regressions
3535
stages:
36-
-
36+
-
3737
stage:
3838
input:
3939
dest_addr: 127.0.0.1
@@ -53,11 +53,11 @@
5353
output:
5454
log_contains: id "913100"
5555

56-
-
56+
-
5757
test_title: 913100-3
5858
desc: Request Indicates a Security Scanner Scanned the Site (913100) from old modsec regressions
5959
stages:
60-
-
60+
-
6161
stage:
6262
input:
6363
dest_addr: 127.0.0.1

util/regression-tests/tests/REQUEST-913-SCANNER-DETECTION/913110.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,12 +5,12 @@
55
enabled: true
66
name: 913110.yaml
77
tests:
8-
-
8+
-
99
test_title: 913110-1
1010
desc: Request Indicates a Security Scanner Scanned the Site (913110) from old modsec
1111
regressions
1212
stages:
13-
-
13+
-
1414
stage:
1515
input:
1616
dest_addr: 127.0.0.1

util/regression-tests/tests/REQUEST-913-SCANNER-DETECTION/913120.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,12 +5,12 @@
55
enabled: true
66
name: 913120.yaml
77
tests:
8-
-
8+
-
99
test_title: 913120-1
1010
desc: Request Indicates a Security Scanner Scanned the Site (913120) from old modsec
1111
regressions
1212
stages:
13-
-
13+
-
1414
stage:
1515
input:
1616
dest_addr: 127.0.0.1
@@ -44,7 +44,7 @@
4444
uri: /AppScan_fingerprint/MAC_ADDRESS_01234567890.html?9ABCDG1
4545
version: HTTP/1.0
4646
output:
47-
log_contains: id "913120"
47+
log_contains: id "913120"
4848
-
4949
test_title: 913120-3
5050
desc: "Scanner identification based on uri"

0 commit comments

Comments
 (0)