Sh3ll
OdayForums


Server : Apache
System : Linux server1.cgrithy.com 3.10.0-1160.95.1.el7.x86_64 #1 SMP Mon Jul 24 13:59:37 UTC 2023 x86_64
User : nobody ( 99)
PHP Version : 8.1.23
Disable Function : NONE
Directory :  /etc/apache2/conf.d/modsec_vendor_configs/OWASP3/util/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Current File : //etc/apache2/conf.d/modsec_vendor_configs/OWASP3/util/send-payload-pls.sh
#!/bin/bash
#
# Script to post a payload against a local webserver at each paranoia level.
#
# Note: Webserver has to be prepared to take desired PL as Request Header "PL".
#
# WARNING: Setting the paranoia level using a header without proper
# authentication and authorization is extremely dangerous, and is not
# recommended for production.
#
# Check how to use the Christian Folini's Apache access log format at:
# https://www.netnea.com/cms/apache-tutorial-5_extending-access-log/
#
# LogFormat "%h %{GEOIP_COUNTRY_CODE}e %u [%{%Y-%m-%d %H:%M:%S}t.%{usec_frac}t] \"%r\" %>s %b \
# \"%{Referer}i\" \"%{User-Agent}i\" \"%{Content-Type}i\" %{remote}p %v %A %p %R \
# %{BALANCER_WORKER_ROUTE}e %X \"%{cookie}n\" %{UNIQUE_ID}e %{SSL_PROTOCOL}x %{SSL_CIPHER}x \
# %I %O %{ratio}n%% %D %{ModSecTimeIn}e %{ApplicationTime}e %{ModSecTimeOut}e \
# %{ModSecAnomalyScoreInPLs}e %{ModSecAnomalyScoreOutPLs}e \
# %{ModSecAnomalyScoreIn}e %{ModSecAnomalyScoreOut}e" extended
#
# This script assumes %{ModSecAnomalyScoreIn}e is the column before to last in
# the access log, if this does not match your LogFormat the script won't work
# For better results set the SecDefaultAction to 'pass'.
#
# The anomaly score envvar can be set as follows:
# SecAction "id:90101,phase:5,pass,nolog,\
#     setenv:ModSecAnomalyScoreIn=%{TX.anomaly_score}"
#
# Sample rule to setup the PL dynamically from localhost"
# SecRule REMOTE_ADDR "@ipMatch 127.0.0.1,192.168.0.128" \
#     "id:90102,phase:1,pass,capture,log,auditlog,\
#     msg:'Setting engine to PL%{matched_var}',chain"
#     SecRule REQUEST_HEADERS:PL "@rx ([1-4])" \
#         "setvar:'tx.executing_paranoia_level=%{matched_var}'"

# Path to CRS rule set and local files
CRS="/usr/share/modsecurity-crs/rules"
accesslog="/apache/logs/access.log"
errorlog="/apache/logs/error.log"
URL="localhost:40080"
protocol="http"
while [[ $# > 0 ]]
do
    case "$1" in
        -c|--crs)
            CRS="$2"
            shift
            ;;
        -a|--access)
            accesslog="$2"
            shift
            ;;
        -e|--error)
            errorlog="$2"
            shift
            ;;
        -u|--url)
            URL="$2"
            shift
            ;;
        -r|--resolve)
            resolve="$2"
            resolve="--resolve $resolve"
            shift
            ;;
        --protocol)
            protocol="$2"
            shift
            ;;
        -P|--payload)
            PAYLOAD="$2"
            shift
            ;;
        -h|--help)
            echo "Usage:"
            echo " --access \"/apache/logs/access.log\""
            echo " --error \"/apache/logs/error.log\""
            echo " --url \"localhost:40080\""
            echo " --resolve \"someservername:40080:localhost\""
            echo " --protocol \"https\""
            echo " --payload \"/tmp/payload\""
            echo " --help"
            exit 1
            ;;
    esac
    shift
done

echo "Using CRS: $CRS"
echo "Using accesslog: $accesslog"
echo "Using errorlog: $errorlog"
echo "Using URL: $URL"
echo "Using protocol: $protocol"

if [ -z "${PAYLOAD+x}" ]; then
    echo "Please submit valid payload file as parameter. This is fatal. Aborting."
    $0 -h
    echo "Examples:"
    echo "  ./send-payload-pls.sh -a /logs/test/access.log \
        -e /logs/test/error.log -u test.test.test.com:6443 --protocol https \
        --payload /tmp/payload --resolve test.test.test.com:6443:192.168.0.128"
    echo "  ./send-payload-pls.sh -a /logs/test/access.log \
        -e /logs/test/error.log -u test.test.test.com:6443 --protocol https \
        --payload 'or 1=1;--' --resolve test.test.test.com:6443:192.168.0.128"
    exit 1
fi

# URL of web server

# Rules per Paranoia level
# Paranoia level 1 rules, rule 012 is the delimiter of the start of PL1
# Paranoia level 1 rules, rule 013 is the delimiter of the end of PL1
PL1=$(awk "/012,phase:2/,/013,phase:1/" $CRS/*.conf |egrep -v "(012|013),phase" |egrep -o "id:[0-9]+" |sed -r 's,id:([0-9]+),\1\\,' |tr -t '\n' '\|' |sed -r 's,\\\|$,,')

# Paranoia level 2 rules, rule 014 is the delimiter of the start of PL2
# Paranoia level 2 rules, rule 015 is the delimiter of the end of PL2
PL2=$(awk "/014,phase:2/,/015,phase:1/" $CRS/*.conf |egrep -v "(014|015),phase" |egrep -o "id:[0-9]+" |sed -r 's,id:([0-9]+),\1\\,' |tr -t '\n' '\|' |sed -r 's,\\\|$,,')

# Paranoia level 3 rules, rule 016 is the delimiter of the start of PL3
# Paranoia level 3 rules, rule 017 is the delimiter of the end of PL3
PL3=$(awk "/016,phase:2/,/017,phase:1/" $CRS/*.conf |egrep -v "(016|017),phase" |egrep -o "id:[0-9]+" |sed -r 's,id:([0-9]+),\1\\,' |tr -t '\n' '\|' |sed -r 's,\\\|$,,')

# Paranoia level 4 rules, rule 018 is the delimiter of the start of PL4
# Paranoia level 4 rules, "Paranoia Levels Finished" delimiter of the end of PL4
PL4=$(awk "/018,phase:2/,/Paranoia Levels Finished/" $CRS/*.conf |egrep -v "018,phase" |egrep -o "id:[0-9]+" |sed -r 's,id:([0-9]+),\1\\,' |tr -t '\n' '\|' |sed -r 's,\\\|$,,')

echo "Sending the following payload at multiple paranoia levels: $PAYLOAD"
echo

for PL in 1 2 3 4; do
    echo "--- Paranoia Level $PL ---"
    echo
    if [ -f "$PAYLOAD" ]; then
        curl $protocol://$URL $resolve -k --data-binary "@$PAYLOAD" -H "PL: $PL" -o /dev/null -s
    else
        curl $protocol://$URL $resolve -k -d "$PAYLOAD" -H "PL: $PL" -o /dev/null -s
    fi

    # Here are three ways to get the transaction unique id,
    # the first one is Christian's format, second is Spartan's format,
    # and the third one tries to guess which is the unique id using a
    # regular expression, the first two require specific format.
    # The automatic format detection may cause the script to malfunction.
    # Uncomment only the required format.
    # To use Christian's accesslog format uncomment the following line
    uniq_id=$(tail -1 $accesslog | cut -d\" -f11 | cut -b2-26)

    # To use Spartan's accesslog format (21 col) uncomment the following line
    #uniq_id=$(tail -1 $accesslog | awk '{print $21}')

    # To use the automatic unique_id detection uncomment the following line
    #uniq_id=$(tail -1 $accesslog | egrep -o '[a-zA-Z0-9]{26,28}')

    echo "Tracking unique id: $uniq_id"

    grep $uniq_id $errorlog | sed -e "s/.*\[id \"//" -e "s/\(......\).*\[msg \"/\1 /" -e "s/\"\].*//" -e "s/(Total .*/(Total ...) .../" -e "s/Incoming and Outgoing Score: [0-9]* [0-9]*/Incoming and Outgoing Score: .../" | sed -e "s/$PL1/& PL1/" -e "s/$PL2/& PL2/" -e "s/$PL3/& PL3/ " -e "s/$PL4/& PL4/" | sort -k2 | sed -r "s/^([0-9]+)$/\1 FOREIGN RULE NOT IN CRS/"

    echo
    echo -n "Total Incoming Score: "

    # Here are two ways to get the transaction anomaly score,
    # the first one is Christian's format, second is Spartan's format
    # To use Christian's accesslog format uncomment the following line
    tail -1 $accesslog | cut -d\" -f11 | cut -d\  -f14 | tr "-" "0"

    # To use Spartan's accesslog format (21 col) uncomment the following line
    # To use a different column change the $NF value, e.g. $(NF-1)
    #tail -1 $accesslog | awk '{print $NF}' | tr "-" "0"
    echo
done

ZeroDay Forums Mini