If you can't immediately fix all vulnerabilities that Netsparker has detected, you can cover them up and defer fixing them until another time. You do this by exporting Netsparker's findings as rules for ModSecurity WAF.
It is possible to either export the information about a single vulnerability as a ModSecurity rule or export information about all the vulnerabilities identified during the scan.
After you import the rules, the ModSecurity web application firewall (WAF) will then block any requests made by malicious hackers.
For further information, see Web Application Firewalls.
ModSecurity WAF Fields
This table lists and describes the ModSecurity WAF fields in the Web Application Firewall tab.
|Add||Click to add an integration.|
|Delete||Click to delete the integration and clear all fields|
|Test Settings||Click to confirm that Netsparker Standard can connect to the configured system.|
|Action||This section contains general fields about the Send To Action.|
|Display Name||This is the name of the configuration that will be shown on menus.|
Types of ModSecurity Rules Netsparker Scanners Export
The export can include three types of ModSecurity rules:
- Denial of access to a URL with a vulnerable parameter
- Denial of access to a URL that can be attacked with a payload
- Denial of access to an exact URL
Netsparker scanners will automatically choose the type of rule depending on the vulnerability, so you do not have to configure anything.
Types of Vulnerabilities Netsparker Scanners Export as ModSecurity Rules
Not all vulnerabilities can be covered up by blocking access to a specific URL with a web application firewall, therefore not all vulnerabilities can be exported as ModSecurity rules. For example, security flaws related to HTTP Cookies, sensitive comments in source code, application source code disclosure and other similar vulnerabilities will not be exported.
How to Configure ModSecurity WAF Rules in Netsparker Standard
- Open Netsparker Standard.
- From the Home tab on the ribbon, click Options. The Options dialog is displayed.
- Click Web Application Firewall.
- From the Add dropdown, select ModSecurity.
- Click OK.
How to Export Netsparker Standard Scan Results as ModSecurity WAF Rules
As written above, rules can be exported in two ways from Netsparker Standard:
- All Vulnerabilities
- Single Vulnerability
If you want to export the rule for All Vulnerabilities:
- Navigate to the Reporting ribbon tab menu and click ModSecurity WAF Rules.
- In the File name field, enter a name and click Save. The Export Report dialog is displayed with the Path (generated from the location and filename from the previous step) already displayed.
- From the Policy dropdown, select an option.
- The Open Generated Report checkbox is already selected (which opens the report on completion). Deselect this option if required.
- Click Save. The ModSecurity WAF Rules Report opens in your default text editor (this example shows Notepad).
If you want to export the rule for a Single Vulnerability:
- Navigate to the Issues pane and select a single vulnerability (in this example, Cross-site Scripting).
- From the Vulnerability tab, click ModSecurity WAF Rules. The Save Report As dialog is displayed.
- In the File name field, enter a name (here ModSecurity WAF Rule – Cross-site Scripting is used), and click Save.
- The exported rule file can be opened in any text editor as shown.