Forum Discussion
madi_56757
Aug 25, 2011Nimbostratus
Apache Killer
hello all,
I need help for following rule
We need an irule to avoid an exploit on Apache
Apache syntax
RewriteEngine On
RewriteCond %{REQUEST_METHOD} ^(HEAD|GET) [NC]
RewriteCond %{HTTP:Range} ([0-9]*-[0-9]*)(\s*,\s*[0-9]*-[0-9]*)+
RewriteRule .* - [F]
- hooleylistCirrostratusApache released 2.2.20 which fixes CVE-2011-3192:
- JRahmAdminI'll send a tshirt to the first non-MVP or F5er with a solution using something other than regex.
- James_Denton_12NimbostratusJason,
when HTTP_REQUEST { if { [HTTP::header exists "Range"] } { set tot_ranges [llength [split [HTTP::header "Range"], ","]] if { $tot_ranges >= 40 } { log local0. " Range attack CVE-2011-3192 detected from [IP::client_addr] on Host [HTTP::host]. [llength [split [HTTP::header "Range"], ","]] ranges requested." HTTP::header remove Range drop } return } }
- JRahmAdminwow, missed this. Yep, that'll play, James. Congrats! We'll get a t-shirt on the way to you. Is the address in your profile correct?
Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects