X-Git-Url: http://ftp.carnet.hr/carnet-debian/scm?a=blobdiff_plain;ds=sidebyside;f=debian%2Fossec-hids%2Fvar%2Fossec%2Frules%2Fweb_appsec_rules.xml;fp=debian%2Fossec-hids%2Fvar%2Fossec%2Frules%2Fweb_appsec_rules.xml;h=0000000000000000000000000000000000000000;hb=946517cefb8751a43a89bda4220221f065f4e5d1;hp=6448db266620cba3c4204c49cc4be460bddab53e;hpb=3f728675941dc69d4e544d3a880a56240a6e394a;p=ossec-hids.git diff --git a/debian/ossec-hids/var/ossec/rules/web_appsec_rules.xml b/debian/ossec-hids/var/ossec/rules/web_appsec_rules.xml deleted file mode 100644 index 6448db2..0000000 --- a/debian/ossec-hids/var/ossec/rules/web_appsec_rules.xml +++ /dev/null @@ -1,191 +0,0 @@ - - - - - - - - - - - 31100 - POST / - /wp-comments-post.php - Googlebot|MSNBot|BingBot - WordPress Comment Spam (coming from a fake search engine UA). - - - - - 31100 - thumb.php|timthumb.php - "GET \S+thumb.php?src=\S+.php - TimThumb vulnerability exploit attempt. - - - - - 31100 - login.php - "POST /\S+.php/login.php?cPath= - osCommerce login.php bypass attempt. - - - - - 31100 - login.php - /admin/\w+.php/login.php - osCommerce file manager login.php bypass attempt. - - - - - 31100 - /cache/external - "GET /\S+/cache/external\S+.php - TimThumb backdoor access attempt. - - - - - 31100 - cart.php - "GET /\S+cart.php?\S+templatefile=../ - Cart.php directory transversal attempt. - - - - - 31100 - DECLARE%20@S%20CHAR|%20AS%20CHAR - MSSQL Injection attempt (ur.php, urchin.js). - - - - - 31100 - "ZmEu"| "libwww-perl/|"the beast"|"Morfeus|"ZmEu|"Nikto|"w3af.sourceforge.net|MJ12bot/v| Jorgee"|"Proxy Gear Pro|"DataCha0s - Blacklisted user agent (known malicious user agent). - - - - - 31108 - wp-login.php|/administrator - ] "POST \S+wp-login.php| "POST /administrator - CMS (WordPress or Joomla) login attempt. - - - - - 31509 - - CMS (WordPress or Joomla) brute force attempt. - - - - - 31100 - " "Wget/ - Blacklisted user agent (wget). - - - - - 31100 - uploadify.php - "GET /\S+/uploadify.php?src=http://\S+.php - Uploadify vulnerability exploit attempt. - - - - - 31100 - delete.php - "GET \S+/delete.php?board_skin_path=http://\S+.php - BBS delete.php exploit attempt. - - - - - 31100 - shell.php - "GET \S+/shell.php?cmd= - Simple shell.php command execution. - - - - - 31100 - phpMyAdmin/scripts/setup.php - PHPMyAdmin scans (looking for setup.php). - - - - - 31100 - .swp$|.bak$|/.htaccess|/server-status|/.ssh|/.history|/wallet.dat - Suspicious URL access. - - - - - 31100 - ] "POST - no_log - POST request received. - - - - 31530 - /wp-admin/|/administrator/|/admin/ - Ignoring often post requests inside /wp-admin and /admin. - - - - 31530 - - High amount of POST requests in a small period of time (likely bot). - - - - - 31100 - %00 - "GET /\S+.php?\S+%00 - Anomaly URL query (attempting to pass null termination). - - - -