From: Victor Julien Date: Fri, 8 Oct 2021 10:26:37 +0000 (+0200) Subject: tests: test for security ticket 4710 X-Git-Tag: suricata-6.0.5~52 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=30943c4caa0fe4e322b5ae43c96be5f884ba7417;p=thirdparty%2Fsuricata-verify.git tests: test for security ticket 4710 --- diff --git a/tests/security-4710-01/input.pcap b/tests/security-4710-01/input.pcap new file mode 100644 index 000000000..82a8f6f7e Binary files /dev/null and b/tests/security-4710-01/input.pcap differ diff --git a/tests/security-4710-01/test.rules b/tests/security-4710-01/test.rules new file mode 100644 index 000000000..c34827cbf --- /dev/null +++ b/tests/security-4710-01/test.rules @@ -0,0 +1,2 @@ +reject tcp any any -> any any (msg: "Bad keyword detected!"; content: "ultrasurf"; http_uri; sid: 1;) +alert tcp any any -> any any (msg:"SURICATA STREAM suspected RST injection"; stream-event:suspected_rst_inject; classtype:protocol-command-decode; sid:2210058; rev:1;) diff --git a/tests/security-4710-01/test.yaml b/tests/security-4710-01/test.yaml new file mode 100644 index 000000000..d39c1f9da --- /dev/null +++ b/tests/security-4710-01/test.yaml @@ -0,0 +1,23 @@ +args: +- -k none + +checks: + - filter: + count: 2 + match: + event_type: alert + - filter: + count: 1 + match: + event_type: alert + alert.signature_id: 1 + - filter: + count: 1 + match: + event_type: alert + alert.signature_id: 2210058 + - filter: + count: 1 + match: + event_type: http + http.url: /ultrasurf.html diff --git a/tests/security-4710-02/input.pcap b/tests/security-4710-02/input.pcap new file mode 100644 index 000000000..55a730ea8 Binary files /dev/null and b/tests/security-4710-02/input.pcap differ diff --git a/tests/security-4710-02/test.rules b/tests/security-4710-02/test.rules new file mode 100644 index 000000000..9c1d6e240 --- /dev/null +++ b/tests/security-4710-02/test.rules @@ -0,0 +1,2 @@ +reject tcp any any -> any any (content: "/"; http_uri; startswith; endswith; sid: 1;) +alert tcp any any -> any any (msg:"SURICATA STREAM suspected RST injection"; stream-event:suspected_rst_inject; classtype:protocol-command-decode; sid:2210058; rev:1;) diff --git a/tests/security-4710-02/test.yaml b/tests/security-4710-02/test.yaml new file mode 100644 index 000000000..d5eca191f --- /dev/null +++ b/tests/security-4710-02/test.yaml @@ -0,0 +1,23 @@ +args: +- -k none + +checks: + - filter: + count: 2 + match: + event_type: alert + - filter: + count: 1 + match: + event_type: alert + alert.signature_id: 1 + - filter: + count: 1 + match: + event_type: alert + alert.signature_id: 2210058 + - filter: + count: 1 + match: + event_type: http + http.url: /