mirror of
https://github.com/owasp-modsecurity/ModSecurity.git
synced 2025-08-13 21:36:00 +03:00
495 lines
14 KiB
C++
495 lines
14 KiB
C++
/*
|
|
* ModSecurity, http://www.modsecurity.org/
|
|
* Copyright (c) 2015 Trustwave Holdings, Inc. (http://www.trustwave.com/)
|
|
*
|
|
* You may not use this file except in compliance with
|
|
* the License. You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* If any of the files related to licensing are missing or if you have any
|
|
* other questions related to licensing please contact Trustwave Holdings, Inc.
|
|
* directly using the email address security@modsecurity.org.
|
|
*
|
|
*/
|
|
|
|
|
|
#ifdef __cplusplus
|
|
#include <ctime>
|
|
#include <iostream>
|
|
#include <string>
|
|
#include <vector>
|
|
#include <list>
|
|
#include <set>
|
|
#endif
|
|
|
|
|
|
#ifndef HEADERS_MODSECURITY_RULES_PROPERTIES_H_
|
|
#define HEADERS_MODSECURITY_RULES_PROPERTIES_H_
|
|
|
|
|
|
#include "modsecurity/modsecurity.h"
|
|
#include "modsecurity/rule.h"
|
|
#include "modsecurity/rules_exceptions.h"
|
|
#include "modsecurity/actions/action.h"
|
|
#include "modsecurity/audit_log.h"
|
|
|
|
|
|
#ifdef __cplusplus
|
|
|
|
namespace modsecurity {
|
|
class RulesExceptions;
|
|
namespace Parser {
|
|
class Driver;
|
|
}
|
|
|
|
using modsecurity::debug_log::DebugLog;
|
|
using modsecurity::audit_log::AuditLog;
|
|
|
|
/** @ingroup ModSecurity_CPP_API */
|
|
class ConfigInt {
|
|
public:
|
|
ConfigInt() : m_set(false), m_value(0) { }
|
|
bool m_set;
|
|
int m_value;
|
|
};
|
|
|
|
|
|
class ConfigDouble {
|
|
public:
|
|
ConfigDouble() : m_set(false), m_value(0) { }
|
|
bool m_set;
|
|
double m_value;
|
|
};
|
|
|
|
|
|
class ConfigString {
|
|
public:
|
|
ConfigString() : m_set(false), m_value("") { }
|
|
bool m_set;
|
|
std::string m_value;
|
|
};
|
|
|
|
|
|
class ConfigSet {
|
|
public:
|
|
ConfigSet() : m_set(false), m_clear(false) { }
|
|
bool m_set;
|
|
bool m_clear;
|
|
std::set<std::string> m_value;
|
|
};
|
|
|
|
|
|
class ConfigUnicodeMap {
|
|
public:
|
|
ConfigUnicodeMap() : m_set(false), m_unicode_map_table(NULL) { }
|
|
bool m_set;
|
|
int *m_unicode_map_table;
|
|
};
|
|
|
|
class RulesProperties {
|
|
public:
|
|
RulesProperties() :
|
|
m_auditLog(new AuditLog()),
|
|
m_requestBodyLimitAction(PropertyNotSetBodyLimitAction),
|
|
m_responseBodyLimitAction(PropertyNotSetBodyLimitAction),
|
|
m_secRequestBodyAccess(PropertyNotSetConfigBoolean),
|
|
m_secResponseBodyAccess(PropertyNotSetConfigBoolean),
|
|
m_secXMLExternalEntity(PropertyNotSetConfigBoolean),
|
|
m_tmpSaveUploadedFiles(PropertyNotSetConfigBoolean),
|
|
m_uploadKeepFiles(PropertyNotSetConfigBoolean),
|
|
m_debugLog(new DebugLog()),
|
|
m_remoteRulesActionOnFailed(PropertyNotSetRemoteRulesAction),
|
|
m_secRuleEngine(PropertyNotSetRuleEngine) { }
|
|
|
|
|
|
explicit RulesProperties(DebugLog *debugLog) :
|
|
m_auditLog(new AuditLog()),
|
|
m_requestBodyLimitAction(PropertyNotSetBodyLimitAction),
|
|
m_responseBodyLimitAction(PropertyNotSetBodyLimitAction),
|
|
m_secRequestBodyAccess(PropertyNotSetConfigBoolean),
|
|
m_secResponseBodyAccess(PropertyNotSetConfigBoolean),
|
|
m_secXMLExternalEntity(PropertyNotSetConfigBoolean),
|
|
m_tmpSaveUploadedFiles(PropertyNotSetConfigBoolean),
|
|
m_uploadKeepFiles(PropertyNotSetConfigBoolean),
|
|
m_debugLog(debugLog),
|
|
m_remoteRulesActionOnFailed(PropertyNotSetRemoteRulesAction),
|
|
m_secRuleEngine(PropertyNotSetRuleEngine) { }
|
|
|
|
|
|
~RulesProperties() {
|
|
int i = 0;
|
|
/** Cleanup the rules */
|
|
for (i = 0; i < modsecurity::Phases::NUMBER_OF_PHASES; i++) {
|
|
std::vector<Rule *> rules = m_rules[i];
|
|
while (rules.empty() == false) {
|
|
Rule *rule = rules.back();
|
|
rules.pop_back();
|
|
if (rule->refCountDecreaseAndCheck()) {
|
|
rule = NULL;
|
|
}
|
|
}
|
|
}
|
|
for (i = 0; i < modsecurity::Phases::NUMBER_OF_PHASES; i++) {
|
|
std::vector<actions::Action *> *tmp = &m_defaultActions[i];
|
|
while (tmp->empty() == false) {
|
|
actions::Action *a = tmp->back();
|
|
tmp->pop_back();
|
|
if (a->refCountDecreaseAndCheck()) {
|
|
a = NULL;
|
|
}
|
|
}
|
|
}
|
|
|
|
delete m_debugLog;
|
|
delete m_auditLog;
|
|
}
|
|
|
|
|
|
/**
|
|
*
|
|
*
|
|
*/
|
|
enum ConfigBoolean {
|
|
TrueConfigBoolean,
|
|
FalseConfigBoolean,
|
|
PropertyNotSetConfigBoolean
|
|
};
|
|
|
|
|
|
/**
|
|
*
|
|
* The RuleEngine enumerator consists in mapping the different states
|
|
* of the rule engine.
|
|
*
|
|
*/
|
|
enum RuleEngine {
|
|
/**
|
|
*
|
|
* Rules won't be evaluated if Rule Engine is set to DisabledRuleEngine
|
|
*
|
|
*/
|
|
DisabledRuleEngine,
|
|
/**
|
|
*
|
|
* Rules will be evaluated and disturb actions will take place if needed.
|
|
*
|
|
*/
|
|
EnabledRuleEngine,
|
|
/**
|
|
* Rules will be evaluated but it won't generate any disruptive action.
|
|
*
|
|
*/
|
|
DetectionOnlyRuleEngine,
|
|
/**
|
|
*
|
|
*/
|
|
PropertyNotSetRuleEngine
|
|
};
|
|
|
|
|
|
/**
|
|
*
|
|
* Defines what actions should be taken in case the body (response or
|
|
* request) is bigger than the expected size.
|
|
*
|
|
*/
|
|
enum BodyLimitAction {
|
|
/**
|
|
*
|
|
* Process partial
|
|
*
|
|
*/
|
|
ProcessPartialBodyLimitAction,
|
|
/**
|
|
*
|
|
* Reject the request
|
|
*
|
|
*/
|
|
RejectBodyLimitAction,
|
|
/**
|
|
*
|
|
*/
|
|
PropertyNotSetBodyLimitAction
|
|
};
|
|
|
|
|
|
/**
|
|
*
|
|
* Defines what actions should be taken in case the remote rules failed to
|
|
* be downloaded (independent of the circumstances)
|
|
*
|
|
*
|
|
*/
|
|
enum OnFailedRemoteRulesAction {
|
|
/**
|
|
*
|
|
* Abort
|
|
*
|
|
*/
|
|
AbortOnFailedRemoteRulesAction,
|
|
/**
|
|
*
|
|
* Warn on logging
|
|
*
|
|
*/
|
|
WarnOnFailedRemoteRulesAction,
|
|
/**
|
|
*
|
|
*/
|
|
PropertyNotSetRemoteRulesAction
|
|
};
|
|
|
|
|
|
static const char *ruleEngineStateString(RuleEngine i) {
|
|
switch (i) {
|
|
case DisabledRuleEngine:
|
|
return "Disabled";
|
|
case EnabledRuleEngine:
|
|
return "Enabled";
|
|
case DetectionOnlyRuleEngine:
|
|
return "DetectionOnly";
|
|
case PropertyNotSetRuleEngine:
|
|
return "PropertyNotSet/DetectionOnly";
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
|
|
static std::string configBooleanString(ConfigBoolean i) {
|
|
switch (i) {
|
|
case TrueConfigBoolean:
|
|
return "True";
|
|
case FalseConfigBoolean:
|
|
return "False";
|
|
case PropertyNotSetConfigBoolean:
|
|
return "Not set";
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
|
|
static int mergeProperties(RulesProperties *from, RulesProperties *to,
|
|
std::ostringstream *err) {
|
|
int amount_of_rules = 0;
|
|
|
|
amount_of_rules = appendRules(from->m_rules, to->m_rules, err);
|
|
if (amount_of_rules < 0) {
|
|
return amount_of_rules;
|
|
}
|
|
|
|
if (from->m_secRuleEngine != PropertyNotSetRuleEngine) {
|
|
to->m_secRuleEngine = from->m_secRuleEngine;
|
|
}
|
|
|
|
if (from->m_secRequestBodyAccess != PropertyNotSetConfigBoolean) {
|
|
to->m_secRequestBodyAccess = from->m_secRequestBodyAccess;
|
|
}
|
|
|
|
if (from->m_secResponseBodyAccess != PropertyNotSetConfigBoolean) {
|
|
to->m_secResponseBodyAccess = from->m_secResponseBodyAccess;
|
|
}
|
|
|
|
if (from->m_secXMLExternalEntity != PropertyNotSetConfigBoolean) {
|
|
to->m_secXMLExternalEntity = from->m_secXMLExternalEntity;
|
|
}
|
|
|
|
if (from->m_uploadKeepFiles != PropertyNotSetConfigBoolean) {
|
|
to->m_uploadKeepFiles = from->m_uploadKeepFiles;
|
|
}
|
|
|
|
if (from->m_tmpSaveUploadedFiles != PropertyNotSetConfigBoolean) {
|
|
to->m_tmpSaveUploadedFiles = from->m_tmpSaveUploadedFiles;
|
|
}
|
|
|
|
if (from->m_requestBodyLimit.m_set == true) {
|
|
to->m_requestBodyLimit.m_value = from->m_requestBodyLimit.m_value;
|
|
}
|
|
|
|
if (from->m_responseBodyLimit.m_set == true) {
|
|
to->m_responseBodyLimit.m_value = from->m_responseBodyLimit.m_value;
|
|
}
|
|
|
|
if (from->m_requestBodyLimitAction != PropertyNotSetBodyLimitAction) {
|
|
to->m_requestBodyLimitAction = from->m_requestBodyLimitAction;
|
|
}
|
|
|
|
if (from->m_responseBodyLimitAction != PropertyNotSetBodyLimitAction) {
|
|
to->m_responseBodyLimitAction = from->m_responseBodyLimitAction;
|
|
}
|
|
|
|
if (from->m_uploadFileLimit.m_set == true) {
|
|
to->m_uploadFileLimit.m_value = from->m_uploadFileLimit.m_value;
|
|
}
|
|
|
|
if (from->m_uploadFileMode.m_set == true) {
|
|
to->m_uploadFileMode.m_value = from->m_uploadFileMode.m_value;
|
|
}
|
|
|
|
if (from->m_uploadDirectory.m_set == true) {
|
|
to->m_uploadDirectory.m_value = from->m_uploadDirectory.m_value;
|
|
}
|
|
|
|
if (from->m_uploadTmpDirectory.m_set == true) {
|
|
to->m_uploadTmpDirectory.m_value = \
|
|
from->m_uploadTmpDirectory.m_value;
|
|
}
|
|
|
|
if (from->m_secArgumentSeparator.m_set == true) {
|
|
to->m_secArgumentSeparator.m_value = \
|
|
from->m_secArgumentSeparator.m_value;
|
|
}
|
|
|
|
if (from->m_unicodeMapTable.m_set == true) {
|
|
to->m_unicodeMapTable.m_unicode_map_table = \
|
|
from->m_unicodeMapTable.m_unicode_map_table;
|
|
}
|
|
|
|
if (from->m_httpblKey.m_set == true) {
|
|
to->m_httpblKey.m_value = from->m_httpblKey.m_value;
|
|
to->m_httpblKey.m_set = from->m_httpblKey.m_set;
|
|
}
|
|
|
|
to->m_exceptions.merge(from->m_exceptions);
|
|
|
|
to->m_components.insert(to->m_components.end(),
|
|
from->m_components.begin(), from->m_components.end());
|
|
|
|
if (from->m_responseBodyTypeToBeInspected.m_set == true) {
|
|
if (from->m_responseBodyTypeToBeInspected.m_clear == true) {
|
|
to->m_responseBodyTypeToBeInspected.m_value.clear();
|
|
from->m_responseBodyTypeToBeInspected.m_value.clear();
|
|
} else {
|
|
for (std::set<std::string>::iterator
|
|
it = from->m_responseBodyTypeToBeInspected.m_value.begin();
|
|
it != from->m_responseBodyTypeToBeInspected.m_value.end(); ++it) {
|
|
to->m_responseBodyTypeToBeInspected.m_value.insert(*it);
|
|
}
|
|
}
|
|
to->m_responseBodyTypeToBeInspected.m_set = true;
|
|
}
|
|
|
|
for (int i = 0; i <= modsecurity::Phases::NUMBER_OF_PHASES; i++) {
|
|
std::vector<actions::Action *> *actions_from = \
|
|
from->m_defaultActions+i;
|
|
std::vector<actions::Action *> *actions_to = to->m_defaultActions+i;
|
|
for (size_t j = 0; j < actions_from->size(); j++) {
|
|
actions::Action *action = actions_from->at(j);
|
|
action->refCountIncrease();
|
|
actions_to->push_back(action);
|
|
}
|
|
}
|
|
|
|
|
|
if (to->m_auditLog) {
|
|
std::string error;
|
|
to->m_auditLog->merge(from->m_auditLog, &error);
|
|
if (error.size() > 0) {
|
|
*err << error;
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
if (from->m_debugLog && to->m_debugLog &&
|
|
from->m_debugLog->isLogFileSet()) {
|
|
if (to->m_debugLog->isLogFileSet() == false) {
|
|
std::string error;
|
|
to->m_debugLog->setDebugLogFile(
|
|
from->m_debugLog->getDebugLogFile(),
|
|
&error);
|
|
if (error.size() > 0) {
|
|
*err << error;
|
|
return -1;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (from->m_debugLog && to->m_debugLog &&
|
|
from->m_debugLog->isLogLevelSet()) {
|
|
if (to->m_debugLog->isLogLevelSet() == false) {
|
|
to->m_debugLog->setDebugLogLevel(
|
|
from->m_debugLog->getDebugLogLevel());
|
|
}
|
|
}
|
|
|
|
return amount_of_rules;
|
|
}
|
|
|
|
|
|
static int appendRules(
|
|
std::vector<modsecurity::Rule *> *from,
|
|
std::vector<modsecurity::Rule *> *to,
|
|
std::ostringstream *err) {
|
|
int amount_of_rules = 0;
|
|
for (int i = 0; i < modsecurity::Phases::NUMBER_OF_PHASES; i++) {
|
|
std::vector<modsecurity::Rule *> *rules_to = to+i;
|
|
std::vector<modsecurity::Rule *> *rules_from = from+i;
|
|
for (size_t j = 0; j < rules_from->size(); j++) {
|
|
Rule *rule = rules_from->at(j);
|
|
for (size_t z = 0; z < rules_to->size(); z++) {
|
|
Rule *rule_ckc = rules_to->at(z);
|
|
if (rule_ckc->m_ruleId == rule->m_ruleId &&
|
|
rule_ckc->m_secMarker == false &&
|
|
rule->m_secMarker == false) {
|
|
if (err != NULL) {
|
|
*err << "Rule id: " \
|
|
<< std::to_string(rule->m_ruleId) \
|
|
<< " is duplicated" << std::endl;
|
|
}
|
|
return -1;
|
|
}
|
|
}
|
|
amount_of_rules++;
|
|
rules_to->push_back(rule);
|
|
rule->refCountIncrease();
|
|
}
|
|
}
|
|
return amount_of_rules;
|
|
}
|
|
|
|
|
|
std::vector<modsecurity::Rule *> *getRulesForPhase(int phase) {
|
|
if (phase >= modsecurity::Phases::NUMBER_OF_PHASES) {
|
|
return NULL;
|
|
}
|
|
return &m_rules[phase];
|
|
}
|
|
|
|
|
|
audit_log::AuditLog *m_auditLog;
|
|
BodyLimitAction m_requestBodyLimitAction;
|
|
BodyLimitAction m_responseBodyLimitAction;
|
|
ConfigBoolean m_secRequestBodyAccess;
|
|
ConfigBoolean m_secResponseBodyAccess;
|
|
ConfigBoolean m_secXMLExternalEntity;
|
|
ConfigBoolean m_tmpSaveUploadedFiles;
|
|
ConfigBoolean m_uploadKeepFiles;
|
|
ConfigDouble m_requestBodyLimit;
|
|
ConfigDouble m_requestBodyNoFilesLimit;
|
|
ConfigDouble m_responseBodyLimit;
|
|
ConfigInt m_uploadFileLimit;
|
|
ConfigInt m_uploadFileMode;
|
|
DebugLog *m_debugLog;
|
|
OnFailedRemoteRulesAction m_remoteRulesActionOnFailed;
|
|
RuleEngine m_secRuleEngine;
|
|
RulesExceptions m_exceptions;
|
|
std::list<std::string> m_components;
|
|
std::ostringstream m_parserError;
|
|
ConfigSet m_responseBodyTypeToBeInspected;
|
|
ConfigString m_httpblKey;
|
|
ConfigString m_uploadDirectory;
|
|
ConfigString m_uploadTmpDirectory;
|
|
ConfigString m_secArgumentSeparator;
|
|
std::vector<actions::Action *> m_defaultActions[8];
|
|
std::vector<modsecurity::Rule *> m_rules[8];
|
|
ConfigUnicodeMap m_unicodeMapTable;
|
|
};
|
|
|
|
#endif
|
|
|
|
#ifdef __cplusplus
|
|
} // namespace modsecurity
|
|
#endif
|
|
|
|
#endif // HEADERS_MODSECURITY_RULES_PROPERTIES_H_
|