Actions
Bug #1098
closedhttp_raw_uri with relative pcre parsing issue
Affected Versions:
Effort:
Difficulty:
Label:
Description
Hi,
Suricata v2.0 beta 2 fire if you use relative uri pcre like this:
alert tcp any any -> any 80 (msg:"Testing Rule1"; content:"baduricontent"; http_raw_uri; pcre:"/[a-z]{5}\.html/R"; sid:1; rev:2;)
but not fire if you use ^ on relative uri pcre like this: (It's fire on snort)
alert tcp any any -> any 80 (msg:"Testing Rule2"; content:"baduricontent"; http_raw_uri; pcre:"/^[a-z]{5}\.html/R"; sid:2; rev:2;)
Tested with: wget http://google.com/baduricontentabcde.html
(joigned pcap file)
Regards
@rmkml rmkml
Files
Updated by Victor Julien almost 11 years ago
- Subject changed from FN on Suricata v2beta2 with relative uri pcre circumflex (^) to http_raw_uri with relative pcre parsing issue
- Assignee set to OISF Dev
- Target version set to 2.0.1rc1
Seems the conclusion in the oisf-devel thread is that this is actually an error reporting bug in rule parsing: https://lists.openinfosecfoundation.org/pipermail/oisf-devel/2014-February/002928.html
Updated by Victor Julien over 10 years ago
- Target version changed from 2.0.1rc1 to 2.0.2
Updated by Victor Julien over 10 years ago
- Status changed from New to Closed
- Assignee changed from OISF Dev to Victor Julien
- % Done changed from 0 to 100
Actions