Tomasz_125022
Sep 26, 2014Nimbostratus
Block-Shellshock-full iRule contains errors in log sctring ($header_value, $header_value) :-) These variables do not exist.
I use:
If it is determined that the vulnerability exists in the payload , this iRule will inspect the entire HTTP request for the pattern.
But it reports only UserAgent value (most common attacks) and reject the source of the attack.
when HTTP_REQUEST {
set pattern "*(*)*\{*";
set uri [HTTP::header Host][HTTP::uri];
set UserAgent [HTTP::header "User-Agent"]";
if { [string match $pattern [HTTP::request]] } {
log local0. "Detected CVE-2014-6271 attack from '[IP::client_addr]' in uri = $uri and UserAgent = $UserAgent";
reject;
}
}