From 32476340c5fd3c76b86487a92fd5c5075342ca99 Mon Sep 17 00:00:00 2001 From: jvoisin Date: Mon, 4 Dec 2017 16:09:50 +0100 Subject: Fix the configuration parser wrt. non-matching brackets This validation step is a bit idiotic, but we'll replace it with a proper parser anyway. --- config/examples.ini | 10 ++-------- 1 file changed, 2 insertions(+), 8 deletions(-) (limited to 'config') diff --git a/config/examples.ini b/config/examples.ini index 68a363d..664a67a 100644 --- a/config/examples.ini +++ b/config/examples.ini @@ -9,7 +9,6 @@ sp.disable_function.function("system").drop(); # AbanteCart 1.2.8 - Multiple SQL Injections -sp.disable_function.filename("/static_pages/index.php").var("_SERVER[PHP_SELF").value_r("\"").drop().alias("XSS"); sp.disable_function.filename("/core/lib/language_manager.php").function("ALanguageManager>_clone_language_rows").param("from_language").value_r("[^0-9]").drop(); sp.disable_function.filename("/admin/model/tool/backup.php").function("ModelToolBackup>createBackupTask").param("data[table_list]").value_r("'").drop(); @@ -25,7 +24,7 @@ sp.disable_function.filename("/modules/Calendar/Activity.php").function("save_mo # The State of Wordpress Security # All In One WP Security & Firewall -sp.disable_function.filename("/admin/wp-security-dashboard-menu.php").function("render_tab3").var("_REQUEST[tab]]").value_r("\"").drop(); +sp.disable_function.filename("/admin/wp-security-dashboard-menu.php").function("render_tab3").var("_REQUEST[tab]").value_r("\"").drop(); # PHPKit 1.6.6: Code Execution for Privileged Users @@ -33,15 +32,10 @@ sp.disable_function.filename("/pkinc/func/default.php").function("move_uploaded_ # Coppermine 1.5.42: Second-Order Command Execution -sp.disable_function.filename("/include/imageobject_im.class.php").function("exec").var("CONFIG[im_options]).value_r("[^a-z0-9]").drop(); +sp.disable_function.filename("/include/imageobject_im.class.php").function("exec").var("CONFIG[im_options]").value_r("[^a-z0-9]").drop(); sp.disable_function.filename("/forgot_passwd.php").function("cpg_db_query").var("CLEAN[id]").value_r("[^a-z0-9]").drop(); -# CVE-2014-1610 - Mediawiki RCE -sp.disable_function.filename("/includes/media/DjVu.php") -sp.disable_function.filename("/includes/media/ImageHandler.php").var("_GET[page]").value_r("[^0-9]").drop() - - # CVE-2017-1001000 - https://blog.sucuri.net/2017/02/content-injection-vulnerability-wordpress-rest-api.html sp.disable_function.filename("/wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php").function("register_routes").var("_GET[id]").value_r("[^0-9]").drop(); sp.disable_function.filename("/wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php").function("register_routes").var("_POST[id]").value_r("[^0-9]").drop(); -- cgit v1.3