mirror of
https://github.com/owasp-modsecurity/ModSecurity.git
synced 2025-09-29 11:16:33 +03:00
Add the ability to build custom request body parser extensions.
Add an example for a request body parser extension.
This commit is contained in:
17
ext/README
17
ext/README
@@ -54,6 +54,23 @@ that combines the REMOTE_ADDR and REMOTE_PORT into a.b.c.d:port format.
|
||||
sudo apxs -i mod_var_remote_addr_port.la
|
||||
|
||||
|
||||
3) Example custom request body parser module
|
||||
|
||||
Module mod_reqbody_example.c creates a custom request body parser named
|
||||
"EXAMPLE". It does noting in particular, but shows the basic structure
|
||||
of such a module.
|
||||
|
||||
# Compile as a normal user
|
||||
apxs -I<MODSECURITY_SOURCE_CODE> -I/usr/include/libxml2 \
|
||||
-ca mod_reqbody_example.c
|
||||
|
||||
# Install as superuser
|
||||
sudo apxs -i mod_var_remote_addr_port.la
|
||||
|
||||
# Write a phase 1 rule to set the parser
|
||||
SecAction "phase:1,pass,nolog,ctl:requestBodyProcessor=EXAMPLE"
|
||||
|
||||
|
||||
Using the Modules
|
||||
-----------------
|
||||
|
||||
|
169
ext/mod_reqbody_example.c
Normal file
169
ext/mod_reqbody_example.c
Normal file
@@ -0,0 +1,169 @@
|
||||
/*
|
||||
* ModSecurity for Apache 2.x, http://www.modsecurity.org/
|
||||
* Copyright (c) 2004-2010 Breach Security, Inc. (http://www.breach.com/)
|
||||
*
|
||||
* This product is released under the terms of the General Public Licence,
|
||||
* version 2 (GPLv2). Please refer to the file LICENSE (included with this
|
||||
* distribution) which contains the complete text of the licence.
|
||||
*
|
||||
* There are special exceptions to the terms and conditions of the GPL
|
||||
* as it is applied to this software. View the full text of the exception in
|
||||
* file MODSECURITY_LICENSING_EXCEPTION in the directory of this software
|
||||
* distribution.
|
||||
*
|
||||
* If any of the files related to licensing are missing or if you have any
|
||||
* other questions related to licensing please contact Breach Security, Inc.
|
||||
* directly using the email address support@breach.com.
|
||||
*
|
||||
*/
|
||||
|
||||
/* This is just an example on how to make an extension to allow custom
|
||||
* request body parsing. This just describes how to do this externally
|
||||
* and you should look more at on e of the internal parsers to see
|
||||
* the full potential.
|
||||
*
|
||||
* This module defines "EXAMPLE" and can be enabled with a rule like this:
|
||||
*
|
||||
* SecAction "phase:1,pass,nolog,ctl:requestBodyProcessor=EXAMPLE"
|
||||
*
|
||||
* See these for real parsers:
|
||||
* msc_reqbody.c
|
||||
* msc_multipart.c
|
||||
* msc_xml.c
|
||||
*/
|
||||
|
||||
#include "httpd.h"
|
||||
#include "http_core.h"
|
||||
#include "http_config.h"
|
||||
#include "http_log.h"
|
||||
#include "http_protocol.h"
|
||||
#include "ap_config.h"
|
||||
#include "apr_optional.h"
|
||||
|
||||
#include "modsecurity.h"
|
||||
|
||||
typedef struct example_ctx {
|
||||
unsigned long length;
|
||||
} example_ctx;
|
||||
|
||||
/**
|
||||
* This function will be invoked to initialize the processor. This is
|
||||
* probably only needed for streaming parsers that must create a context.
|
||||
*/
|
||||
static int example_init(modsec_rec *msr, char **error_msg)
|
||||
{
|
||||
if (error_msg == NULL) return -1;
|
||||
*error_msg = NULL;
|
||||
|
||||
ap_log_error(APLOG_MARK, APLOG_INFO | APLOG_NOERRNO, 0, NULL,
|
||||
"mod_reqbody_example: init()");
|
||||
|
||||
msr->reqbody_processor_ctx = apr_pcalloc(msr->mp, sizeof(example_ctx));
|
||||
if (msr->reqbody_processor_ctx == NULL) {
|
||||
/* Set error message and return -1 if unsuccessful */
|
||||
*error_msg = apr_pstrdup(msr->mp, "failed to create example requbody processor context");
|
||||
return -1;
|
||||
}
|
||||
|
||||
/* Return 1 on success */
|
||||
return 1;
|
||||
}
|
||||
|
||||
/**
|
||||
* This function will be invoked whenever the ModSecurity has data to
|
||||
* be processed. You probably at least need to increment the no_files
|
||||
* length, but otherwise this is only useful for a streaming parser.
|
||||
*/
|
||||
static int example_process(modsec_rec *msr,
|
||||
const char *buf, unsigned int size, char **error_msg)
|
||||
{
|
||||
example_ctx *ctx = (example_ctx *)msr->reqbody_processor_ctx;
|
||||
|
||||
if (error_msg == NULL) return -1;
|
||||
*error_msg = NULL;
|
||||
|
||||
ap_log_error(APLOG_MARK, APLOG_INFO | APLOG_NOERRNO, 0, NULL,
|
||||
"mod_reqbody_example: process()");
|
||||
|
||||
/* Need to increment the no_files length if this is not an uploaded file.
|
||||
* Failing to do this will mess up some other limit checks.
|
||||
*/
|
||||
msr->msc_reqbody_no_files_length += size;
|
||||
|
||||
/* Check for an existing context and do something interesting
|
||||
* with the chunk of data we have been given.
|
||||
*/
|
||||
if (ctx != NULL) {
|
||||
ctx->length += size;
|
||||
}
|
||||
|
||||
/* Return 1 on success */
|
||||
return 1;
|
||||
}
|
||||
|
||||
/**
|
||||
* This function is called to signal the parser that the request body is
|
||||
* complete. Here you should do any final parsing. For non-streaming parsers
|
||||
* you can parse the data in msr->msc_reqbody_buffer of length
|
||||
* msr->msc_reqbody_length. See modsecurity_request_body_end_urlencoded() in
|
||||
* msc_reqbody.c for an example of this.
|
||||
*/
|
||||
static int example_complete(modsec_rec *msr, char **error_msg)
|
||||
{
|
||||
example_ctx *ctx = (example_ctx *)msr->reqbody_processor_ctx;
|
||||
|
||||
if (error_msg == NULL) return -1;
|
||||
*error_msg = NULL;
|
||||
|
||||
ap_log_error(APLOG_MARK, APLOG_INFO | APLOG_NOERRNO, 0, NULL,
|
||||
"mod_reqbody_example: complete()");
|
||||
|
||||
ap_log_error(APLOG_MARK, APLOG_INFO | APLOG_NOERRNO, 0, NULL,
|
||||
"mod_reqbody_example: request body length=%lu", ctx->length);
|
||||
|
||||
/* Return 1 on success */
|
||||
return 1;
|
||||
}
|
||||
|
||||
static int hook_pre_config(apr_pool_t *mp, apr_pool_t *mp_log, apr_pool_t *mp_temp) {
|
||||
|
||||
void (*fn)(const char *name,
|
||||
void *fn_init, void *fn_process, void *fn_complete);
|
||||
|
||||
/* Look for the registration function exported by ModSecurity. */
|
||||
fn = APR_RETRIEVE_OPTIONAL_FN(modsec_register_reqbody_processor);
|
||||
if (fn) {
|
||||
/* Use it to register our new request body parser functions under
|
||||
* the name "EXAMPLE".
|
||||
*/
|
||||
fn("EXAMPLE",
|
||||
(void *)example_init,
|
||||
(void *)example_process,
|
||||
(void *)example_complete);
|
||||
}
|
||||
else {
|
||||
ap_log_error(APLOG_MARK, APLOG_ERR | APLOG_NOERRNO, 0, NULL,
|
||||
"mod_reqbody_example: Unable to find modsec_register_reqbody_processor.");
|
||||
}
|
||||
|
||||
return OK;
|
||||
}
|
||||
|
||||
/* This is a function to register another function to be called during
|
||||
* the Apache configuration process.
|
||||
*/
|
||||
static void register_hooks(apr_pool_t *p) {
|
||||
ap_hook_pre_config(hook_pre_config, NULL, NULL, APR_HOOK_LAST);
|
||||
}
|
||||
|
||||
/* Dispatch list for API hooks */
|
||||
module AP_MODULE_DECLARE_DATA reqbody_example_module = {
|
||||
STANDARD20_MODULE_STUFF,
|
||||
NULL, /* create per-dir config structures */
|
||||
NULL, /* merge per-dir config structures */
|
||||
NULL, /* create per-server config structures */
|
||||
NULL, /* merge per-server config structures */
|
||||
NULL, /* table of config file commands */
|
||||
register_hooks /* register hooks */
|
||||
};
|
||||
|
Reference in New Issue
Block a user