@@ -34,69 +34,14 @@ SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 1" "id:913012,phase:2,pass,nolog,skipAf
34
34
# Chained rule is allow listing:
35
35
# YUM package manager of CentOS / Fedore: User-Agent: urlgrabber/3.10 yum/3.4.3
36
36
# eCairn service: User-Agent: mozilla/5.0 ecairn-grabber/1.0 (+http://ecairn.com/grabber)
37
- SecRule REQUEST_HEADERS:User-Agent "@pmFromFile scanners-user-agents.data" \
38
- "id:913100,\
39
- phase:1,\
40
- block,\
41
- capture,\
42
- t:none,\
43
- msg:'Found User-Agent associated with security scanner',\
44
- logdata:'Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}',\
45
- tag:'application-multi',\
46
- tag:'language-multi',\
47
- tag:'platform-multi',\
48
- tag:'attack-reputation-scanner',\
49
- tag:'paranoia-level/1',\
50
- tag:'OWASP_CRS',\
51
- tag:'capec/1000/118/224/541/310',\
52
- tag:'PCI/6.5.10',\
53
- ver:'OWASP_CRS/4.0.0-rc1',\
54
- severity:'CRITICAL',\
55
- chain"
56
- SecRule MATCHED_VARS "!@rx ^(?:urlgrabber/[0-9\.]+ yum/[0-9\.]+|mozilla/[0-9\.]+ ecairn-grabber/[0-9\.]+ \(\+http://ecairn.com/grabber\))$" \
57
- "setvar:'tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}'"
58
-
59
- SecRule REQUEST_HEADERS_NAMES|REQUEST_HEADERS "@pmFromFile scanners-headers.data" \
60
- "id:913110,\
61
- phase:1,\
62
- block,\
63
- capture,\
64
- t:none,\
65
- msg:'Found request header associated with security scanner',\
66
- logdata:'Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}',\
67
- tag:'application-multi',\
68
- tag:'language-multi',\
69
- tag:'platform-multi',\
70
- tag:'attack-reputation-scanner',\
71
- tag:'paranoia-level/1',\
72
- tag:'OWASP_CRS',\
73
- tag:'capec/1000/118/224/541/310',\
74
- tag:'PCI/6.5.10',\
75
- ver:'OWASP_CRS/4.0.0-rc1',\
76
- severity:'CRITICAL',\
77
- setvar:'tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}'"
78
-
79
-
80
-
81
- SecRule REQUEST_FILENAME|ARGS "@pmFromFile scanners-urls.data" \
82
- "id:913120,\
83
- phase:2,\
84
- block,\
85
- capture,\
86
- t:none,\
87
- msg:'Found request filename/argument associated with security scanner',\
88
- logdata:'Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}',\
89
- tag:'application-multi',\
90
- tag:'language-multi',\
91
- tag:'platform-multi',\
92
- tag:'attack-reputation-scanner',\
93
- tag:'paranoia-level/1',\
94
- tag:'OWASP_CRS',\
95
- tag:'capec/1000/118/224/541/310',\
96
- tag:'PCI/6.5.10',\
97
- ver:'OWASP_CRS/4.0.0-rc1',\
98
- severity:'CRITICAL',\
99
- setvar:'tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}'"
37
+ SecRule REQUEST_HEADERS:User-Agent "@pmFromFile scanners-user-agents.data" "id:913100, phase:1, block, capture, t:none, msg:'Found User-Agent associated with security scanner', logdata:'Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}', tag:'application-multi', tag:'language-multi', tag:'platform-multi', tag:'attack-reputation-scanner', tag:'paranoia-level/1', tag:'OWASP_CRS', tag:'capec/1000/118/224/541/310', tag:'PCI/6.5.10', ver:'OWASP_CRS/4.0.0-rc1', severity:'CRITICAL', chain"
38
+ SecRule MATCHED_VARS "!@rx ^(?:urlgrabber/[0-9\.]+ yum/[0-9\.]+|mozilla/[0-9\.]+ ecairn-grabber/[0-9\.]+ \(\+http://ecairn.com/grabber\))$" "setvar:'tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}'"
39
+
40
+ SecRule REQUEST_HEADERS_NAMES|REQUEST_HEADERS "@pmFromFile scanners-headers.data" "id:913110, phase:1, block, capture, t:none, msg:'Found request header associated with security scanner', logdata:'Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}', tag:'application-multi', tag:'language-multi', tag:'platform-multi', tag:'attack-reputation-scanner', tag:'paranoia-level/1', tag:'OWASP_CRS', tag:'capec/1000/118/224/541/310', tag:'PCI/6.5.10', ver:'OWASP_CRS/4.0.0-rc1', severity:'CRITICAL', setvar:'tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}'"
41
+
42
+
43
+
44
+ SecRule REQUEST_FILENAME|ARGS "@pmFromFile scanners-urls.data" "id:913120, phase:2, block, capture, t:none, msg:'Found request filename/argument associated with security scanner', logdata:'Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}', tag:'application-multi', tag:'language-multi', tag:'platform-multi', tag:'attack-reputation-scanner', tag:'paranoia-level/1', tag:'OWASP_CRS', tag:'capec/1000/118/224/541/310', tag:'PCI/6.5.10', ver:'OWASP_CRS/4.0.0-rc1', severity:'CRITICAL', setvar:'tx.inbound_anomaly_score_pl1=+%{tx.critical_anomaly_score}'"
100
45
101
46
102
47
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 2" "id:913013,phase:1,pass,nolog,skipAfter:END-REQUEST-913-SCANNER-DETECTION"
@@ -115,25 +60,7 @@ SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 2" "id:913014,phase:2,pass,nolog,skipAf
115
60
#
116
61
# This rule is a sibling of rule 913100.
117
62
#
118
- SecRule REQUEST_HEADERS:User-Agent "@pmFromFile scripting-user-agents.data" \
119
- "id:913101,\
120
- phase:1,\
121
- block,\
122
- capture,\
123
- t:none,\
124
- msg:'Found User-Agent associated with scripting/generic HTTP client',\
125
- logdata:'Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}',\
126
- tag:'application-multi',\
127
- tag:'language-multi',\
128
- tag:'platform-multi',\
129
- tag:'attack-reputation-scripting',\
130
- tag:'OWASP_CRS',\
131
- tag:'capec/1000/118/224/541/310',\
132
- tag:'PCI/6.5.10',\
133
- tag:'paranoia-level/2',\
134
- ver:'OWASP_CRS/4.0.0-rc1',\
135
- severity:'CRITICAL',\
136
- setvar:'tx.inbound_anomaly_score_pl2=+%{tx.critical_anomaly_score}'"
63
+ SecRule REQUEST_HEADERS:User-Agent "@pmFromFile scripting-user-agents.data" "id:913101, phase:1, block, capture, t:none, msg:'Found User-Agent associated with scripting/generic HTTP client', logdata:'Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}', tag:'application-multi', tag:'language-multi', tag:'platform-multi', tag:'attack-reputation-scripting', tag:'OWASP_CRS', tag:'capec/1000/118/224/541/310', tag:'PCI/6.5.10', tag:'paranoia-level/2', ver:'OWASP_CRS/4.0.0-rc1', severity:'CRITICAL', setvar:'tx.inbound_anomaly_score_pl2=+%{tx.critical_anomaly_score}'"
137
64
138
65
139
66
@@ -146,25 +73,7 @@ SecRule REQUEST_HEADERS:User-Agent "@pmFromFile scripting-user-agents.data" \
146
73
#
147
74
# This rule is a sibling of rule 913100.
148
75
#
149
- SecRule REQUEST_HEADERS:User-Agent "@pmFromFile crawlers-user-agents.data" \
150
- "id:913102,\
151
- phase:1,\
152
- block,\
153
- capture,\
154
- t:none,\
155
- msg:'Found User-Agent associated with web crawler/bot',\
156
- logdata:'Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}',\
157
- tag:'application-multi',\
158
- tag:'language-multi',\
159
- tag:'platform-multi',\
160
- tag:'attack-reputation-crawler',\
161
- tag:'OWASP_CRS',\
162
- tag:'capec/1000/118/116/150',\
163
- tag:'PCI/6.5.10',\
164
- tag:'paranoia-level/2',\
165
- ver:'OWASP_CRS/4.0.0-rc1',\
166
- severity:'CRITICAL',\
167
- setvar:'tx.inbound_anomaly_score_pl2=+%{tx.critical_anomaly_score}'"
76
+ SecRule REQUEST_HEADERS:User-Agent "@pmFromFile crawlers-user-agents.data" "id:913102, phase:1, block, capture, t:none, msg:'Found User-Agent associated with web crawler/bot', logdata:'Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}: %{MATCHED_VAR}', tag:'application-multi', tag:'language-multi', tag:'platform-multi', tag:'attack-reputation-crawler', tag:'OWASP_CRS', tag:'capec/1000/118/116/150', tag:'PCI/6.5.10', tag:'paranoia-level/2', ver:'OWASP_CRS/4.0.0-rc1', severity:'CRITICAL', setvar:'tx.inbound_anomaly_score_pl2=+%{tx.critical_anomaly_score}'"
168
77
169
78
170
79
SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 3" "id:913015,phase:1,pass,nolog,skipAfter:END-REQUEST-913-SCANNER-DETECTION"
0 commit comments