-
-
Notifications
You must be signed in to change notification settings - Fork 226
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Adds support for regex in ctl key #718
Comments
This issue is stale because it has been open for 30 days with no activity. |
Can't wait to see the feature ! I have so much trouble to deal with false positive rule when ARGS look like this : |
Are you up to work out such change? If not, would you come up with a unit
test with meaningful cases?
…On Sun, 13 Aug 2023, 18:45 Barnoux, ***@***.***> wrote:
Can't wait to see the feature ! I have so much trouble to deal with false
positive rule when ARGS look like this :
ARGS:json.login.uris.0.uri
ARGS:json.login.uris.1.uri
ARGS:json.passwordHistory.2.password
ARGS:json.passwordHistory.1.password
ARGS:json.passwordHistory.0.password
etc...
—
Reply to this email directly, view it on GitHub
<#718 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAXOYASMMS4V354ZWBRT2JTXVEACXANCNFSM6AAAAAAVZDJAMA>
.
You are receiving this because you authored the thread.Message ID:
***@***.***>
|
Feature will be veeeery appreciated! |
Awesome! I wonder if any of you guys could provide example cases so we make
sure we aren't implementing an hypothetical feature but more like something
you will actually use.
…On Thu, 21 Sept 2023, 10:21 flyingman15, ***@***.***> wrote:
Feature will be veeeery appreciated!
—
Reply to this email directly, view it on GitHub
<#718 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAXOYASDYXKAUKLSNYJFCUDX3P2IVANCNFSM6AAAAAAVZDJAMA>
.
You are receiving this because you authored the thread.Message ID:
***@***.***>
|
Hello, |
Let me dig in my old conf files, because I had some actual use cases. |
@jcchavezs I can try to work on a use case with Vaultwarden, but i don't know exactly what you need. |
We need to show actual rules that will benefit from this. |
Hi, as I enhance the configuration of CRS for the Vaultwarden application, I've encountered a scenario where employing regex for the ctl key, specifically for ARGS, could be beneficial. In the given example, the alert (ID 932220) is triggered because the ARGS content of json.login.uris.1.uri is encrypted:
When adding an element in the Vault, multiple URLs can be involved, as illustrated in the provided image. This scenario highlights the need for adding regex for ctl key to facilitate easier whitelisting. Here's the current whitelist rule under construction:
This rule aims to allow the creation of a new password element while excluding specific ARGS related to the mentioned alert, thereby enhancing security configurations for Vaultwarden. |
Summary
From @fzipi:
This should be valid ctl syntax:
ctl:ruleRemoveTargetById=123456;ARGS:/^mycookie_/
It doesn't work on ModSecurity: longstanding unfixed issues owasp-modsecurity/ModSecurity#717 and owasp-modsecurity/ModSecurity#911
Motivation
More args can be covered in the same rule rather than more declarations.
The text was updated successfully, but these errors were encountered: