Forum Discussion
Craig_C_
Nimbostratus
Sep 24, 2014Has anyone written an iRule to filter CVE-2014-6271?
CVE-2014-6271 was made public today, potentially wreaking havoc on apache/bash. Has anyone written an iRule to filter this vulnerability from HTTP GET requests?
benoit_9199
Nimbostratus
Sep 25, 2014Here is some corrections on your version but the initial version seem more simple and does match all headers so...
when HTTP_REQUEST {
foreach header_name [HTTP::header names] {
foreach header_value [HTTP::header values $header_name] {
replaced [string match -nocase "() \{*;\};*" $header_value], doesn't match enough
if { $header_value contains "() \{" } {
log local0. "Detected CVE-2014-6271 attack from [IP::client_addr]"
reject
}
}
}
}
Edit: added a missing ending "*" for the match to work
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects