Hello,
please what do You say about following Mod Security rules application on public shared hosting server, do you find any of them beneficial? Thank You
SQL Injection
SecRule ARGS "unions+select" \
"t:lowercase,deny,msg:'SQL Injection'"
SecRule ARGS "unions+alls+select" \
"t:lowercase,deny,msg:'SQL Injection'"
SecRule ARGS "intos+outfile" \
"t:lowercase,deny,msg:'SQL Injection'"
SecRule ARGS "drops+table" \
"t:lowercase,deny,msg:'SQL Injection'"
SecRule ARGS "alters+table" \
"t:lowercase,deny,msg:'SQL Injection'"
SecRule ARGS "load_file" \
"t:lowercase,deny,msg:'SQL Injection'"
SecRule ARGS "selects+" \
"t:lowercase,deny,msg:'SQL Injection'"
Command Execution
This rule matches too often
SecRule ARGS "^(rm|ls|kill|(send)?mail|cat|echo|/bin/|/etc/|/tmp/)[[:space:]]" \
"deny"
Directory traversal (do NOT worked for me, almost any URL request got banned)
SecRule REQUEST_URI "@streq ../" \
"t:urlDecode,deny"
Some of the rules from: blog.art-of-coding.eu/implementing-a-web-application-firewall/
please what do You say about following Mod Security rules application on public shared hosting server, do you find any of them beneficial? Thank You
SQL Injection
SecRule ARGS "unions+select" \
"t:lowercase,deny,msg:'SQL Injection'"
SecRule ARGS "unions+alls+select" \
"t:lowercase,deny,msg:'SQL Injection'"
SecRule ARGS "intos+outfile" \
"t:lowercase,deny,msg:'SQL Injection'"
SecRule ARGS "drops+table" \
"t:lowercase,deny,msg:'SQL Injection'"
SecRule ARGS "alters+table" \
"t:lowercase,deny,msg:'SQL Injection'"
SecRule ARGS "load_file" \
"t:lowercase,deny,msg:'SQL Injection'"
SecRule ARGS "selects+" \
"t:lowercase,deny,msg:'SQL Injection'"
Command Execution
This rule matches too often
SecRule ARGS "^(rm|ls|kill|(send)?mail|cat|echo|/bin/|/etc/|/tmp/)[[:space:]]" \
"deny"
Directory traversal (do NOT worked for me, almost any URL request got banned)
SecRule REQUEST_URI "@streq ../" \
"t:urlDecode,deny"
Some of the rules from: blog.art-of-coding.eu/implementing-a-web-application-firewall/
Last edited: