diff options
Diffstat (limited to 'config/examples.rules')
| -rw-r--r-- | config/examples.rules | 41 |
1 files changed, 0 insertions, 41 deletions
diff --git a/config/examples.rules b/config/examples.rules deleted file mode 100644 index 664a67a..0000000 --- a/config/examples.rules +++ /dev/null | |||
| @@ -1,41 +0,0 @@ | |||
| 1 | # Restrict system calls to specific file | ||
| 2 | sp.disable_function.function("system").filename("/update.php").allow(); | ||
| 3 | sp.disable_function.function("system").drop(); | ||
| 4 | |||
| 5 | |||
| 6 | # Restrict system calls to specific file with a specific hash | ||
| 7 | sp.disable_function.function("system").filename("/update.php").hash("d27c6c5686bc129716b6aac8dfefe2d519a80eb6cc144e97ad42c728d423eed0").allow(); | ||
| 8 | sp.disable_function.function("system").drop(); | ||
| 9 | |||
| 10 | |||
| 11 | # AbanteCart 1.2.8 - Multiple SQL Injections <https://blog.ripstech.com/2016/abantecart-multiple-sql-injections> | ||
| 12 | sp.disable_function.filename("/core/lib/language_manager.php").function("ALanguageManager>_clone_language_rows").param("from_language").value_r("[^0-9]").drop(); | ||
| 13 | sp.disable_function.filename("/admin/model/tool/backup.php").function("ModelToolBackup>createBackupTask").param("data[table_list]").value_r("'").drop(); | ||
| 14 | |||
| 15 | |||
| 16 | # Redaxo 5.2.0: Remote Code Execution via CSRF <https://blog.ripstech.com/2016/redaxo-remote-code-execution-via-csrf> | ||
| 17 | # See <http://code.vtiger.com/vtiger/vtigercrm/commit/9b5c5338f80237ae072a06e1ba4a5cfcbfe063b0> for details | ||
| 18 | sp.disable_function.filename("/redaxo/src/addons/structure/pages/linkmap.php").function("substr").param("string").value_r("\"").drop(); | ||
| 19 | |||
| 20 | |||
| 21 | # Guest Post: Vtiger 6.5.0 - SQL Injection <https://blog.ripstech.com/2016/vtiger-sql-injection/> | ||
| 22 | sp.disable_function.filename("/modules/Calendar/Activity.php").function("save_module").param("query").value_r("[^0-9;]").drop(); | ||
| 23 | |||
| 24 | |||
| 25 | # The State of Wordpress Security <https://blog.ripstech.com/2016/the-state-of-wordpress-security> | ||
| 26 | # All In One WP Security & Firewall | ||
| 27 | sp.disable_function.filename("/admin/wp-security-dashboard-menu.php").function("render_tab3").var("_REQUEST[tab]").value_r("\"").drop(); | ||
| 28 | |||
| 29 | |||
| 30 | # PHPKit 1.6.6: Code Execution for Privileged Users <https://blog.ripstech.com/2016/phpkit-code-exection-for-privileged-users> | ||
| 31 | sp.disable_function.filename("/pkinc/func/default.php").function("move_uploaded_file").param("destination").value_r("\\.ph\\.+$").drop(); | ||
| 32 | |||
| 33 | |||
| 34 | # Coppermine 1.5.42: Second-Order Command Execution <https://blog.ripstech.com/2016/coppermine-second-order-command-execution> | ||
| 35 | sp.disable_function.filename("/include/imageobject_im.class.php").function("exec").var("CONFIG[im_options]").value_r("[^a-z0-9]").drop(); | ||
| 36 | sp.disable_function.filename("/forgot_passwd.php").function("cpg_db_query").var("CLEAN[id]").value_r("[^a-z0-9]").drop(); | ||
| 37 | |||
| 38 | |||
| 39 | # CVE-2017-1001000 - https://blog.sucuri.net/2017/02/content-injection-vulnerability-wordpress-rest-api.html | ||
| 40 | sp.disable_function.filename("/wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php").function("register_routes").var("_GET[id]").value_r("[^0-9]").drop(); | ||
| 41 | sp.disable_function.filename("/wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php").function("register_routes").var("_POST[id]").value_r("[^0-9]").drop(); | ||
