<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Limiting http methods to specific URLs in Custom Signatures</title>
    <link>https://live.paloaltonetworks.com/t5/custom-signatures/limiting-http-methods-to-specific-urls/m-p/412522#M398</link>
    <description>&lt;P&gt;Has anyone had luck limiting http methods like PUT to limited URLs? For example, limiting a PUT to &lt;A href="https://www.foo.com/" target="_blank"&gt;https://www.foo.com/&lt;/A&gt; but not to &lt;A href="https://www.foo.com/folder1" target="_self"&gt;https://www.foo.com/folder1&lt;/A&gt; ? I've created a custom vulnerability that allows the http-method (http-req-header length &amp;gt; 0 which http-method=PUT) in a custom vulnerability but I am having trouble limiting it to the host only portion or the URL/URI. Not sure if this should be further defined in the custom vulnerability, URL category, or just as an fqdn address object? I am trying to think that if I have a use case in the future to allow to &lt;A href="https://www.foo.com/folder1" target="_self"&gt;https://www.foo.com/folder2&lt;/A&gt; but not &lt;A href="https://www.foo.com/folder1" target="_self"&gt;https://www.foo.com/folder2/uploads&lt;/A&gt; would it be the same solution?&lt;/P&gt;</description>
    <pubDate>Fri, 11 Jun 2021 12:58:06 GMT</pubDate>
    <dc:creator>IamJoeG</dc:creator>
    <dc:date>2021-06-11T12:58:06Z</dc:date>
    <item>
      <title>Limiting http methods to specific URLs</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/limiting-http-methods-to-specific-urls/m-p/412522#M398</link>
      <description>&lt;P&gt;Has anyone had luck limiting http methods like PUT to limited URLs? For example, limiting a PUT to &lt;A href="https://www.foo.com/" target="_blank"&gt;https://www.foo.com/&lt;/A&gt; but not to &lt;A href="https://www.foo.com/folder1" target="_self"&gt;https://www.foo.com/folder1&lt;/A&gt; ? I've created a custom vulnerability that allows the http-method (http-req-header length &amp;gt; 0 which http-method=PUT) in a custom vulnerability but I am having trouble limiting it to the host only portion or the URL/URI. Not sure if this should be further defined in the custom vulnerability, URL category, or just as an fqdn address object? I am trying to think that if I have a use case in the future to allow to &lt;A href="https://www.foo.com/folder1" target="_self"&gt;https://www.foo.com/folder2&lt;/A&gt; but not &lt;A href="https://www.foo.com/folder1" target="_self"&gt;https://www.foo.com/folder2/uploads&lt;/A&gt; would it be the same solution?&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jun 2021 12:58:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/limiting-http-methods-to-specific-urls/m-p/412522#M398</guid>
      <dc:creator>IamJoeG</dc:creator>
      <dc:date>2021-06-11T12:58:06Z</dc:date>
    </item>
    <item>
      <title>Re: Limiting http methods to specific URLs</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/limiting-http-methods-to-specific-urls/m-p/416373#M400</link>
      <description>&lt;P&gt;You should try using a targeted security policy with a Custom URL entry to match the URN of interest in the Service/URL Category tab of the Security Policy Rule. You will then apply the restrictive Vulnerability Protection Profile with an Exception set to block on your Custom Vulnerability Signature. Note that given that these are HTTP(S) resources, this is dependent on successful TLS decryption.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Jun 2021 19:36:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/limiting-http-methods-to-specific-urls/m-p/416373#M400</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2021-06-30T19:36:14Z</dc:date>
    </item>
    <item>
      <title>Re: Limiting http methods to specific URLs</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/limiting-http-methods-to-specific-urls/m-p/416476#M401</link>
      <description>&lt;P&gt;Thanks, any idea what the terminating character for the custom URL would be? For instance, how would one limit to only the top level meaning example.com but not grant access to example.com/file1, example.com/cgi-bin, or example.com/*&lt;/P&gt;</description>
      <pubDate>Thu, 01 Jul 2021 11:59:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/limiting-http-methods-to-specific-urls/m-p/416476#M401</guid>
      <dc:creator>IamJoeG</dc:creator>
      <dc:date>2021-07-01T11:59:22Z</dc:date>
    </item>
    <item>
      <title>Re: Limiting http methods to specific URLs</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/limiting-http-methods-to-specific-urls/m-p/416485#M402</link>
      <description>&lt;P&gt;you can block a single URL if you use a literal URL for the policy and no special characters such as asterisk tailing the string, so just put in example.com/ and no "*" at the end.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Jul 2021 12:17:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/limiting-http-methods-to-specific-urls/m-p/416485#M402</guid>
      <dc:creator>Lucky</dc:creator>
      <dc:date>2021-07-01T12:17:38Z</dc:date>
    </item>
  </channel>
</rss>

