Complimentary 90-day, on-prem license available for entities involved in Covid19 response.
SUPPORT

24/5 Hotline Support Service

+44 (0)20 3588 3841

Open a Support Ticket

support@netsparker.com

Generating ModSecurity WAF Rules from Netsparker Standard

If you can't immediately fix all vulnerabilities that Netsparker has detected, you can cover them up and defer fixing them until another time. You do this by exporting Netsparker's findings as rules for ModSecurity WAF.

If you can't immediately fix all vulnerabilities that Netsparker has detected, you can cover them up and defer fixing them until another time. You do this by exporting Netsparker's findings as rules for ModSecurity WAF.

It is possible to either export the information about a single vulnerability as a ModSecurity rule or export information about all the vulnerabilities identified during the scan.

After you import the rules, the ModSecurity web application firewall (WAF) will then block any requests made by malicious hackers.

For further information, see Web Application Firewalls.

Types of ModSecurity Rules Netsparker Scanners Export

The export can include three types of ModSecurity rules:

  1. Denial of access to a URL with a vulnerable parameter
  2. Denial of access to a URL that can be attacked with a payload
  3. Denial of access to an exact URL

Netsparker scanners will automatically choose the type of rule depending on the vulnerability, so you do not have to configure anything.

Types of Vulnerabilities Netsparker Scanners Export as ModSecurity Rules

Not all vulnerabilities can be covered up by blocking access to a specific URL with a web application firewall, therefore not all vulnerabilities can be exported as ModSecurity rules. For example, security flaws related to HTTP Cookies, sensitive comments in source code, application source code disclosure and other similar vulnerabilities will not be exported.

How to Configure ModSecurity WAF Rules in Netsparker Standard

  1. Open Netsparker Standard.
  2. From the Home tab on the ribbon, click Options. The Options dialog is displayed.
  3. Click Web Application Firewall.
  4. From the Add dropdown, select ModSecurity.

  1. Click OK.

How to Export Netsparker Standard Scan Results as ModSecurity WAF Rules

As written above, rules can be exported in two ways from Netsparker Standard:

  • All Vulnerabilities
  • Single Vulnerability

If you want to export the rule for All Vulnerabilities:

  1. Navigate to the Reporting ribbon tab menu and click ModSecurity WAF Rules.

  1. In the File name field, enter a name and click Save. The Export Report dialog is displayed with the Path (generated from the location and filename from the previous step) already displayed.
  2. From the Policy dropdown, select an option.
  3. The Open Generated Report checkbox is already selected (which opens the report on completion). Deselect this option if required.
  4. Click Save. The ModSecurity WAF Rules Report opens in your default text editor (this example shows Notepad).

If you want to export the rule for a Single Vulnerability:

  1. Navigate to the Issues pane and select a single vulnerability (in this example, Cross-site Scripting).

  1. From the Vulnerability tab, click ModSecurity WAF Rules. The Save Report As dialog is displayed.

  1. In the File name field, enter a name (here ModSecurity WAF Rule – Cross-site Scripting is used), and click Save.

  1. The exported rule file can be opened in any text editor as shown.

Netsparker

Dead accurate, fast & easy-to-use Web Application Security Scanner

GET A DEMO