X-Git-Url: http://ftp.carnet.hr/carnet-debian/scm?p=ossec-hids.git;a=blobdiff_plain;f=etc%2Frules%2Fweb_appsec_rules.xml;fp=etc%2Frules%2Fweb_appsec_rules.xml;h=e3d9aaa6c7fafe109be59ef87db815121c020acb;hp=0000000000000000000000000000000000000000;hb=ff0e686ac67bbd82b60c277eb324910dbc60f65f;hpb=33a81e69474ae91ecec4e991debe59e26bb330fd diff --git a/etc/rules/web_appsec_rules.xml b/etc/rules/web_appsec_rules.xml new file mode 100755 index 0000000..e3d9aaa --- /dev/null +++ b/etc/rules/web_appsec_rules.xml @@ -0,0 +1,152 @@ + + + + + + + + + + + 31100 + POST / + /wp-comments-post.php + Googlebot|MSNBot|BingBot + WordPress Comment Spam (coming from a fake search engine UA). + + + + + 31100 + thumb.php|timthumb.php + "GET \S+thumb.php?src=\S+.php + TimThumb vulnerability exploit attempt. + + + + + 31100 + login.php + "POST /\S+.php/login.php?cPath= + osCommerce login.php bypass attempt. + + + + + 31100 + login.php + "GET /\S+/admin/file_manager.php/login.php + osCommerce file manager login.php bypass attempt. + + + + + 31100 + /cache/external + "GET /\S+/cache/external\S+.php + TimThumb backdoor access attempt. + + + + + 31100 + cart.php + "GET /\S+cart.php?\S+templatefile=../ + Cart.php directory transversal attempt. + + + + + 31100 + DECLARE%20@S%20CHAR|%20AS%20CHAR + MSSQL Injection attempt (ur.php, urchin.js). + + + + + 31100 + "ZmEu"| "libwww-perl/ + Blacklisted user agent (known malicious user agent). + + + + + 31108 + wp-login.php + ] "POST \S+wp-login.php + WordPress login attempt. + + + + + 31509 + + WordPress wp-login.php brute force attempt. + + + + + 31100 + " "Wget/ + Blacklisted user agent (wget). + + + + + 31100 + uploadify.php + "GET /\S+/uploadify.php?src=http://\S+.php + TimThumb vulnerability exploit attempt. + + + + + 31100 + delete.php + "GET \S+/delete.php?board_skin_path=http://\S+.php + BBS delete.php exploit attempt. + + + + + 31100 + %00 + "GET /\S+.php?\S+%00 + Anomaly URL query (attempting to pass null termination). + + + + + + + + + +