-
Notifications
You must be signed in to change notification settings - Fork 727
FPs with 941150 #1123
Comments
How often do you get these? Depending on the application a lot, I presume. But how across multiple applications? |
I'm trying to get this information but anything can go in the query string really. |
Yes, absolutely. But then it's PL2 and writing a rule exclusion if you use the QS parameter src seems acceptable to me (not at PL1 though). |
IMO rule exclusions should be the last resort. I'd prefer if we either move this to a higher PL or create a sibling at a higher PL to handle ARGS. |
That is a valid position, but not one that I share. I think we need other opinions from other people to make a call. |
Hi guys, this one in particular if it is a false positive to me it won't grant opening a hole on the CRS as I see this back firing with LFI/RFI/SSRF false negatives, that is better to catch at PL2 instead of dealing with PL3 debugging. In this case I would better deal with either exceptions, anomaly threshold levels, anomaly scores and the soon to come executing paranoia. |
Interestingly, I don't see a lot of false positives on this rule. In fact I have just one exclusion for this ruleId. On a cookie in fact. So for me this rule does seem okay in Paranoia Level 2. |
Taking this upside down, how many are actually getting hits on this rule with the query string? As I mentioned, having src and href in the query string is not uncommon. |
I've looked in a very big corpus of alerts triggered by burp. I saw the rule triggered 14 times. That is less than I expected. However, @lifeforms is a hoster so you have various applications and my customers go with over 100 reverse proxies, mostly B2B applications. FPs are no big deal for this rule. I think it really depends on a particular application and what it does with the query strings. Usually no problem, but some application will run into FPs systematically. |
Fair enough. If you all reckon this rule is OK as it is then we can close this ticket. |
I agree that URLs in themselves are not highly common inputs but we do regularly see them in "redirect to" or "get back to" parameters, and also in posted HTML content, so the FP risk is definitely there. But in my opinion it's an acceptable level for a rule that we put in PL2. I do think it brings important protection to the table. Those types of "redirect to" parameters are often being reflected by an application, and XSS could play a role there. Maybe we can make the pattern more specific in the future? We have to consider carefully browsers "autocorrecting" invalid HTML due to lax parsing however. So I see how the pattern might have been kept a bit minimal deliberately. |
This issue has been open 120 days with no activity. Remove the stale label or comment, or this will be closed in 14 days |
Rule 941150 at PL2 is very prone to FPs, e.g. it will match if the QS containing
src=foo
.We could move the ARGS* to a higher PL, or the rule altogether.
The text was updated successfully, but these errors were encountered: