libinjection bypasses
Hello Nick,
I'm terribly sorry for not contacting you directly before my Blackhat talk came out.
I was introducing sql fuzzer, which (among others) allows to easily find libinjection bypasses. Please check out the BH slides and my github for more info:
https://www.blackhat.com/docs/us-16/materials/us-16-Ivanov-Web-Application-Firewalls-Analysis-Of-Detection-Logic.pdf
As a result, you may want to update fingerprints.txt with new tokens, or even change tokenizer mechanism a bit (symbols such as *, !, <, some others are parsed and treated wrong).
Hello @attackercan
Oh no problem.. I heard there was a talk at BH. Too bad we didn't meet up.
A SQL Fuzzer? Fantastic! I've been waiting for someone to write one :-)
I'll take a look at your talks shortly,
regards,
n
Nice work @attackercan! By the way did you look at my new regexps in CRS 3? ;) (scared now) I did a complete rewrite of the PHP/RCE rules and always love more expert review.
I've coordinated that we'll try to do a new ModSecurity 2.9 release around the time that CRS 3.0 will be released (probably October) to update our bundled libinjection. So this is a good time to make a step forward on both fronts :)
@client9 I was PoCing for BH, don't expect much from it (yet). I'm currently working on improvements @lifeforms will aim to do that next week. I've heard @csanders-git embeded my regexp-based poc into modsec's SDLC - though dont expect any new findings from me :)
https://twitter.com/NGalbreath/status/766294673837006848