looking into appsec setup, looks like some cvs are disabled, should i enable / update and how
Ran this command and found there are few diabled, and if I manually update it, it seems to stay disabled
It also seems a hub update and hub upgrade do not resolve the disabled status
11 Replies
Important Information
Thank you for getting in touch with your support request. To expedite a swift resolution, could you kindly provide the following information? Rest assured, we will respond promptly, and we greatly appreciate your patience. While you wait, please check the links below to see if this issue has been previously addressed. If you have managed to resolve it, please use run the command
/resolve
or press the green resolve button below.Log Files
If you possess any log files that you believe could be beneficial, please include them at this time. By default, CrowdSec logs to /var/log/, where you will discover a corresponding log file for each component.
Guide Followed (CrowdSec Official)
If you have diligently followed one of our guides and hit a roadblock, please share the guide with us. This will help us assess if any adjustments are necessary to assist you further.
Screenshots
Please forward any screenshots depicting errors you encounter. Your visuals will provide us with a clear view of the issues you are facing.
Β© Created By WhyAydan for CrowdSec β€οΈ
Did it state about anything being tainted?
it did not
hmmm, can you run
docker exec crowdsec cscli collections list | grep appsec
and if you run
cscli version
its 1.6.8
?yes, but for extra
Can you run running both
hub update
and hub upgrade
with the --debug
flag and dump the logs to me in a DM?
Ahhh I figured it out, some vpatch
rules are only for wordpress specific behaviours
Those rules you found are under the the crowdsecurity/appsec-wordpress
collection and we dont install these by default since they might trigger on non wordpress sites.nice, I use Wordpress, seems I could enable them, but, I also have several domains, but only a few of them do WordPress, is there a way to match <domain> <--> <appsec_rule>?
So currently, you need to disable the rule explicitly using a
pre_eval
hook in the config (https://docs.crowdsec.net/docs/next/appsec/hooks#pre_eval), but it's very verbose.
We are thinking about ways on how to make this better, but it will take a bit of timeAppSec Component Hooks | CrowdSec
The Application Security Component allows you to hook at different stages to change its behavior at runtime.
that being said, in theory, it won't hurt to enable the WP rules for non-WP websites, they are targeting specific vulnerabilities, so the risk of false positives is fairly low