OWASP CRS 4.17.0 released

Published by

The OWASP Core Rule Set (CRS) version 4.17.0 has been released, providing an essential toolkit for identifying and mitigating web application attacks via ModSecurity or similar firewalls. This update includes significant enhancements, notably the removal of PCI DSS tags, which indicates a shift towards more streamlined and focused detection capabilities.

Key Updates in CRS 4.17.0:

1. New Detection Features:
- ASP.NET Errors: Detection capabilities have been expanded to include errors specific to ASP.NET applications.
- Remote Code Execution (RCE): New rules have been introduced to detect potential RCE attacks via the Referer header.
- LaTeX Injection: The update includes mechanisms to identify LaTeX injection attempts.
- Ruby Error Detection: Enhanced detection for Ruby errors and associated code leakage has been implemented.

2. Fixes and Improvements:
- The update addresses various technical issues, such as the removal of problematic "dot stars" in regex patterns and implementing word boundaries to refine Java error matching.
- Updates to `java-classes.data` and fixes to file URIs and JSON payload matches have also been made to enhance overall rule accuracy and performance.

3. Contributions:
- The release acknowledges new contributors who have participated in enhancing the rule set, reflecting a collaborative effort within the open-source community.

Importance of CRS 4.17.0

This version not only bolsters the security features of web applications but also streamlines the detection process, thereby reducing false positives and improving response times to potential threats. The removal of PCI DSS tags suggests a move towards more adaptable rules that can cater to a wider range of applications beyond just payment card data security.

Looking Ahead

As the cybersecurity landscape continues to evolve, it is crucial for web application firewalls to adapt and incorporate new detection methods. Future updates may further refine these capabilities, introduce new features based on emerging threats, and enhance compatibility with various web technologies. The community's involvement in the development of CRS underscores the importance of collaborative efforts in maintaining robust web security standards.

For a detailed overview of all changes and contributions, users can refer to the full changelog for version 4.17.0

OWASP CRS 4.17.0 released

OWASP CRS 4.17.0, a collection of general rules for spotting attacks that work with ModSecurity or similar web application firewalls, has been released and features important updates, such as the removal of PCI DSS tags and the introduction of new features and detection methods. These include detection for ASP.NET errors, RCE via the Referer header, LaTeX injection, and Ruby errors. Other changes include fixing dot stars, using word boundaries, updating java-classes.data, and updating file uris.

OWASP CRS 4.17.0 released @ Linux Compatible