Actions
Bug #3518
closedBypass of Payload detection on TCP Teardown
Status:
Closed
Priority:
Normal
Assignee:
-
Target version:
-
Affected Versions:
Effort:
Difficulty:
Label:
Description
While configuring Suricata on inline mode with established tcp connections, it is possible to bypass its detection by sending the custom payload before closing the connection on the TCP teardown.
- cat /etc/suricata/rules/local.rules
alert tcp any any -> any any (msg:"WEB ATTACKS /etc/passwd command attempt"; flow:established; content:"/etc/passwd";classtype:web-application-attack;sid:1328;rev:6;)
- suricata -c /etc/suricata/suricata.yaml -i eth0
Client Server
SYN SYN,ACK
ACK
FIN,ACK FIN,ACK
ACK, packet with content "/etc/passwd"
ACK RST
I consider this a bug because Suricata triggers the alert on receiving the same content in the same scenario but specifying the rest of the flags. Moreover, SNORT configured with the same settings and scenario triggers an alert.
Files
Actions