-
-
Notifications
You must be signed in to change notification settings - Fork 382
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
LDAP Injection Rule #276
Comments
User dune73 commented on date 2016-03-06 08:34:03: dnkolegov : Let's try and get this sorted out. Do you have the capacity to test any new rules proposed here? My ldap knowledge is fairly limited and I do not want to introduce false positives here. I think together we can get it done. |
User dnkolegov commented on date 2016-03-09 04:16:25: I propose to consider the following regex:
Tests:
|
User dune73 commented on date 2016-03-09 05:18:27: Thank you. That looks remarkable. So this is a list of attack strings and a regex, which detects them? What about false positives? |
User dnkolegov commented on date 2016-03-09 05:41:52: I tested this regex only for some valid LDAP filters:
|
User csanders-git commented on date 2016-08-11 02:13:54: dune73 i guess this never got added - it is great work though I think we should put it on the 3.1 list. |
User dune73 commented on date 2016-08-11 03:19:24: I like this as well. But I think we need somebody with real ldap experience telling us, if FPs are likely. |
User dnkolegov commented on date 2016-08-11 03:43:52: Updated regex (fixed whitespaces):
|
User lifeforms commented on date 2017-09-24 11:11:17: A new exploit: https://blog.ripstech.com/2017/joomla-takeover-in-20-seconds-with-ldap-injection-cve-2017-14596/ |
User dune73 commented on date 2018-12-17 13:24:30: This is still not added and given our lack of knowledge for everything LDAP we would rely on dnkolegov's word to go and include this into our rule set. So dnkolegov, are you actively using this rule on your server(s)? Any feedback with regards to false positives? |
User dnkolegov commented on date 2018-12-18 09:55:36: This rule was developed and used within a proprietary Positive Technologies' Application Firewall. I do not remember customer requests regarding this rule. But I have not been working there for 2 years, so I do not have actual information. |
User dune73 commented on date 2018-12-18 09:59:52: Thank you for writing in again, dnkolegov! So what do we do guys: I see this as a new paranoia level 3 rule, or we drop the endeavour despite the good contribution by dnkolegov because we simply lack the knowledge to support this. |
User lifeforms commented on date 2018-12-18 10:28:49: I would argue to bring back the rule in the default set (paranoia level 1). Vulnerability to LDAP injection may be somewhat rare, but nevertheless it's a well published attack class, I could see it being important to enterprise users, and even OWASP and Webappsec wikis have extensive pages on it. The LDAP injection rule was present in CRS 2.x but removed, I have no data why, but I can't recall ever having operations trouble with the rule myself. Our old rule was apparently not having enough coverage, but with the improvements by dnkolegov A risk could be false positives, but we'll have our regular development cycle with the release candidates to flesh them out. We can be a little more bold at the start of a cycle, and if we run into trouble we can always put the rule in a higher paranoia level. |
User dune73 commented on date 2018-12-25 21:02:27: OK. Let's do that. I'll prepare a PR. |
User dune73 commented on date 2019-03-11 21:11:38: I've done the following rule now
Triggered with Question: Where do we put this. I've added it to 921, protocol attacks, but so far there are only http protocol attacks in this group. Other options? |
User dune73 commented on date 2020-02-11 14:06:34: During the monthly CRS community chat, I re-confirmed my lifelong commitment to this problem and I promised to make this into a PR and get it merged. Meeting minutes: SpiderLabs/owasp-modsecurity-crs#1671 (comment) |
User dune73 commented on date 2020-05-05 12:50:52: A long story comes to an end. We merged the fix for this with PR #1707. Thank you for your contribution dnkolegov. |
Issue originally created by user dnkolegov on date 2016-01-14 05:44:24.
Link to original issue: SpiderLabs/owasp-modsecurity-crs#276.
The following LDAP injection vectors from Alonso-Parada research are not detected by current LDAP Injection Rule:
foo)(sn=100
printer)(uid=*)
printer)(department=fa*)
printer)(department=*fa*)
Burp Suite uses the following vectors to test an LDAP Injection and they are also not detected:
eb9adbd87d)(sn=*
eb9adbd87d)!(sn=*
*)(sn=*
*)!(sn=*
Also it is not obvious the purpose of the top and middle parts of regular expression that check values beginning with
(
:Which LDAP injection context is supposed here?
The text was updated successfully, but these errors were encountered: