Uploaded image for project: 'RHEL'
  1. RHEL
  2. RHEL-78711

A form data, "鹿沼市御成橋"(a name of street/city in Japanese) is forbade by mod_security_crs-3.3.4-3.el8.noarch

Linking RHIVOS CVEs to...Migration: Automation ...SWIFT: POC ConversionSync from "Extern...XMLWordPrintable

    • Icon: Bug Bug
    • Resolution: Done-Errata
    • Icon: Undefined Undefined
    • rhel-8.10.z
    • rhel-8.0.0
    • mod_security_crs
    • None
    • mod_security_crs-3.3.4-3.el8_10.2
    • No
    • Low
    • rhel-stacks-web-servers
    • ssg_core_services
    • 2
    • False
    • False
    • Hide

      None

      Show
      None
    • None
    • Red Hat Enterprise Linux
    • None
    • None

      What were you trying to do that didn't work?

      A form data, "鹿沼市御成橋"(a name of street/city in Japanese) is forbade by mod_security_crs-3.3.4-3.el8.noarch

      Please provide the package NVR for which the bug is seen:

      mod_security_crs-3.3.4-3.el8.noarch

      How reproducible is this bug?:

      1. Install mod_security_crs-3.3.4-3.el8.noarch and add "SecStatusEngine On" in /etc/httpd/conf.d/mod_security.conf

      ~~~ /etc/httpd/conf.d/mod_security.conf
      <IfModule mod_security2.c>
      SecStatusEngine On
      ...
      ~~~

      2. Make test form html.
      ~~~
      cat << 'EOF' > /var/www/html/test-form.html
      <form method="POST" action="test.html">
      <input type="text" name="testdata">
      <button>ok</button>
      </form>
      EOF
      echo test > /var/www/html/test.html
      ~~~

      3. Access to http://webserver/test-form.html and input "鹿沼市御成橋" and push ok button. 

      [Mon Feb 10 20:22:06.092310 2025] [:error] [pid 10118:tid 140302354282240] [client 192.168.122.69:58840] [client 192.168.122.69] ModSecurity: Warning. Pattern match "^\\\\d.:+$" at REQUEST_HEADERS:Host. [file "/etc/httpd/modsecurity.d/activated_rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "736"] [id "920350"] [msg "Host header is a numeric IP address"] [data "192.168.122.249"] [severity "WARNING"] [ver "OWASP_CRS/3.3.4"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [tag "PCI/6.5.10"] [hostname "192.168.122.249"] [uri "/test-form.html"] [unique_id "Z6qmPqU@KiYMyTKHSJYGAAAAAIA"]
      [Mon Feb 10 20:25:35.838619 2025] [:error] [pid 10118:tid 140302329104128] [client 192.168.122.69:58875] [client 192.168.122.69] ModSecurity: Warning. Pattern match "^\\\\d.:+$" at REQUEST_HEADERS:Host. [file "/etc/httpd/modsecurity.d/activated_rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "736"] [id "920350"] [msg "Host header is a numeric IP address"] [data "192.168.122.249"] [severity "WARNING"] [ver "OWASP_CRS/3.3.4"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [tag "PCI/6.5.10"] [hostname "192.168.122.249"] [uri "/test.html"] [unique_id "Z6qnD6U@KiYMyTKHSJYGAQAAAIM"], referer: http://192.168.122.249/test-form.html
      [Mon Feb 10 20:25:35.839006 2025] [:error] [pid 10118:tid 140302329104128] [client 192.168.122.69:58875] [client 192.168.122.69] ModSecurity: Warning. Pattern match "[^\\\\xe4]\\\\xbc[^\\\\x9a][^\\\\xbe>][^\\\\xe7][^\\\\xa4]\\\\xbe>|<[^\\\\xbe][^\\\\xe7][^\\\\xa4]\\\\xbe" at ARGS:testdata. [file "/etc/httpd/modsecurity.d/activated_rules/REQUEST-941-APPLICATION-ATTACK-XSS.conf"] [line "546"] [id "941310"] [msg "US-ASCII Malformed Encoding XSS Filter - Attack Detected"] [data "Matched Data: \\xbc\\xe5\\xb8\\x82\\xe5\\xbe found within ARGS:testdata: \\xe9\\xb9\\xbf\\xe6\\xb2\\xbc\\xe5\\xb8\\x82\\xe5\\xbe\\xa1\\xe6\\x88\\x90\\xe6\\xa9\\x8b"] [severity "CRITICAL"] [ver "OWASP_CRS/3.3.4"] [tag "application-multi"] [tag "language-multi"] [tag "platform-tomcat"] [tag "attack-xss"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/152/242"] [hostname "192.168.122.249"] [uri "/test.html"] [unique_id "Z6qnD6U@KiYMyTKHSJYGAQAAAIM"], referer: http://192.168.122.249/test-form.html
      [Mon Feb 10 20:25:35.839145 2025] [:error] [pid 10118:tid 140302329104128] [client 192.168.122.69:58875] [client 192.168.122.69] ModSecurity: Access denied with code 403 (phase 2). Operator GE matched 5 at TX:anomaly_score. [file "/etc/httpd/modsecurity.d/activated_rules/REQUEST-949-BLOCKING-EVALUATION.conf"] [line "153"] [id "949110"] [msg "Inbound Anomaly Score Exceeded (Total Score: 8)"] [severity "CRITICAL"] [ver "OWASP_CRS/3.3.4"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-generic"] [hostname "192.168.122.249"] [uri "/test.html"] [unique_id "Z6qnD6U@KiYMyTKHSJYGAQAAAIM"], referer: http://192.168.122.249/test-form.html
      [Mon Feb 10 20:25:35.839267 2025] [:error] [pid 10118:tid 140302329104128] [client 192.168.122.69:58875] [client 192.168.122.69] ModSecurity: Warning. Operator GE matched 5 at TX:inbound_anomaly_score. [file "/etc/httpd/modsecurity.d/activated_rules/RESPONSE-980-CORRELATION.conf"] [line "92"] [id "980130"] [msg "Inbound Anomaly Score Exceeded (Total Inbound Score: 8 - SQLI=0,XSS=5,RFI=0,LFI=0,RCE=0,PHPI=0,HTTP=0,SESS=0): individual paranoia level scores: 8, 0, 0, 0"] [ver "OWASP_CRS/3.3.4"] [tag "event-correlation"] [hostname "192.168.122.249"] [uri "/test.html"] [unique_id "Z6qnD6U@KiYMyTKHSJYGAQAAAIM"], referer: http://192.168.122.249/test-form.html

      4. Access to http://webserver/test-form.html and input "会社" and push ok button.

      [Mon Feb 10 20:28:40.020916 2025] [:error] [pid 10118:tid 140302303926016] [client 192.168.122.69:58893] [client 192.168.122.69] ModSecurity: Warning. Pattern match "^\\\\d.:+$" at REQUEST_HEADERS:Host. [file "/etc/httpd/modsecurity.d/activated_rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "736"] [id "920350"] [msg "Host header is a numeric IP address"] [data "192.168.122.249"] [severity "WARNING"] [ver "OWASP_CRS/3.3.4"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [tag "PCI/6.5.10"] [hostname "192.168.122.249"] [uri "/test.html"] [unique_id "Z6qnyKU@KiYMyTKHSJYGAgAAAIY"], referer: http://192.168.122.249/test-form.html

      Expected results

      These characters should not be banned.

      Actual results

      The combination of these three kanji "沼市御" is prohibited. The characters themselves have no practical meaning, but the combination "鹿沼市御成橋"(a name of city/street in Japanese) is a common place name, which is often used.

       
      $ echo -e '\xe9\xb9\xbf\xe6\xb2\xbc\xe5\xb8\x82\xe5\xbe\xa1\xe6\x88\x90\xe6\xa9\x8b'
      鹿沼市御成橋

      $ echo -e '\xe6\xb2\xbc\xe5\xb8\x82\xe5\xbe\xa1'
      沼市御
       

              luhliari@redhat.com Lubos Uhliarik
              rhn-support-xixing Xiaodong Xing
              Lubos Uhliarik Lubos Uhliarik
              Iveta Kyralova Iveta Kyralova
              Votes:
              0 Vote for this issue
              Watchers:
              6 Start watching this issue

                Created:
                Updated:
                Resolved: