Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

False positive: rule 941340 on Azure Front Door #2341

Closed
exlibris opened this issue Dec 22, 2021 · 5 comments
Closed

False positive: rule 941340 on Azure Front Door #2341

exlibris opened this issue Dec 22, 2021 · 5 comments
Assignees

Comments

@exlibris
Copy link

Description

"Matched Data: ""url":"https://XXXXXXX.XX.XXX/psc/XXjob/XXCAREERS/HRCR/c/HRS_HRAM_FL.HRS_CG_SEARCH_FL.GBL?page=HRS_"

See attached image for redacted log entry.
FirewallLog

Audit Logs / Triggered Rule Numbers

WAF rule id 941340

Your Environment

Azure Front Door

Confirmation

[X ] I have removed any personal data (email addresses, IP addresses,
passwords, domain names) from any logs posted.

@azurit
Copy link
Member

azurit commented Dec 22, 2021

@exlibris Thank you for reporting this! We will take a look on this issue as soon as possible.

@fzipi
Copy link
Member

fzipi commented Dec 26, 2021

Hi @exlibris ! Looks like you have indeed fall into a false positive. But this one is tricky, because you definitely want to oversee that this full URL passed is properly used and sanitized by the application before creating an exception.

For your Azure Front Door case, you should read this documentation: https://docs.microsoft.com/en-us/azure/web-application-firewall/ag/application-gateway-waf-configuration

If you have more control on the WAF (e.g. ModSecurity or custom install) you can create an exception following this doc: https://coreruleset.org/docs/configuring/false_positives_tuning/#example-7-ctlruleremovetargetbyid.

@fzipi fzipi added the azure label Dec 26, 2021
@fzipi fzipi changed the title False positive False positive: rule 941340 on Azure Front Door Dec 26, 2021
@fzipi
Copy link
Member

fzipi commented Jan 2, 2022

@exlibris Any news on this? Did you used a custom rule?

@fzipi fzipi self-assigned this Jan 2, 2022
@exlibris
Copy link
Author

exlibris commented Jan 3, 2022

We did fix things in our Azure configuration so that our users are not effected. Interestingly, the cookie being set is not actually part of our application - it is for a different site within our enterprise, but was causing problems for us because we share the same domain. So, we are good to go at our end. I just thought that this should perhaps be fixed universally in case it causes problems for others. Took us quite a bit of diffing (and a support call to Microsoft) to get to the bottom of it. Would be good to spare others the hassle if indeed it is a false positive.

@fzipi
Copy link
Member

fzipi commented Jan 22, 2022

Excellent.

There is not much we can do here as this is specific to the applications you are using. But thanks for letting us know, and I'm glad you solved it. Closing.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants