# http://www.gotroot.com/mod_security+rules # Gotroot.com ModSecurity rules # Just In Time Patches for Vulnerable Applications Rules # # Version: N-20061219-01 # # Download from: http://www.gotroot.com/downloads/ftp/mod_security/jitp.conf # # Created by Michael Shinn of the Prometheus Group (http://www.prometheus-group.com) # Copyright 2005 and 2006 by Michael Shinn and the Prometheus Group, all rights reserved. # Redistribution is strictly prohibited in any form, including whole or in part. # # THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS AS IS # AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE # IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE # ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE # LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR # CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF # SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS # INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN # CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) # ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF # THE POSSIBILITY OF SUCH DAMAGE. # # modsecurity is trademark of Thinking Stone, Ltd. # #-------------------------------- # notes #-------------------------------- # Rules work with modsecurity 1.9.x and above only #-------------------------------- #start rules #-------------------------------- # WEB-CGI formmail SecFilterSelective REQUEST_URI "/(formmail|mailform)(\x0a|\.pl\x0a)" #pals-cgi arbitrary file access attempt SecFilterSelective REQUEST_URI "/pals-cgi.*documentName=" # WEB-CGI phf arbitrary command execution attempt SecFilterSelective REQUEST_URI "/phf" chain SecFilter "\x0a/" # WEB-CGI phf access SecFilterSelective THE_REQUEST "/phf(\?| HTTP\/(0\.9|1\.0|1\.1)$)" # WEB-CGI htsearch arbitrary file read attempt SecFilterSelective REQUEST_URI "/htsearch\?exclude=\`" # WEB-CGI csSearch.cgi arbitrary command execution attempt SecFilterSelective REQUEST_URI "/csSearch\.cgi\?" chain SecFilter "\`" ## WEB-CGI FormHandler.cgi directory traversal attempt attempt SecFilterSelective REQUEST_URI "/FormHandler\.cgi" chain SecFilter "/\.\./" # WEB-CGI FormHandler.cgi external site redirection attempt SecFilterSelective REQUEST_URI "/FormHandler\.cgi" chain SecFilter "redirect=http" # WEB-PHP squirrel mail spell-check arbitrary command attempt SecFilterSelective REQUEST_URI "/squirrelspell/modules/check_me\.mod\.php" chain SecFilter "SQSPELL_APP\[" # WEB-PHP squirrel mail theme arbitrary command attempt SecFilterSelective REQUEST_URI "/left_main\.php" chain SecFilter "cmdd=" # WEB-PHP directory.php arbitrary command attempt SecFilterSelective REQUEST_URI "/directory\.php\?" chain SecFilter "\;" # WEB-PHP PHPLIB remote commanSelective THE_REQUESTd attempt SecFilterSelective THE_REQUEST "_PHPLIB\[libdir\]" # WEB-PHP PHPLIB remote command attempt SecFilterSelective REQUEST_URI "/db_mysql\.inc" # Exploit phpBB Highlighting Code Execution Attempt SecFilterSelective THE_REQUEST "(\;|\&)highlight=\'\.system\(" # Exploit phpBB Highlighting SQL Injection SecFilterSelective THE_REQUEST "&highlight=\'\.mysql_query\(" # Exploit phpBB Highlighting Code Execution - Santy.A Worm SecFilterSelective THE_REQUEST "&highlight=\'\.fwrite\(fopen\(" # Exploit phpBB Highlight Exploit Attempt SecFilterSelective THE_REQUEST "&highlight=\x2527\x252Esystem\(" # WEB-CGI dcforum.cgi directory traversal attempt SecFilterSelective REQUEST_URI "/dcforum\.cgi" chain SecFilter "forum=\.\./\.\." # WEB-CGI dcboard.cgi invalid user addition attempt SecFilterSelective REQUEST_URI "/dcboard\.cgi.*\|admin" # WEB-CGI alchemy http server PRN arbitrary command execution attempt SecFilterSelective THE_REQUEST "/PRN/\.\./\.\./" # WEB-CGI alchemy http server NUL arbitrary command execution attempt SecFilterSelective THE_REQUEST "/NUL/\.\./\.\./" # WEB-CGI AltaVista Intranet Search directory traversal attempt SecFilterSelective REQUEST_URI "/query\?mss=\.\." # WEB-CGI hello.bat arbitrary command execution attempt SecFilterSelective REQUEST_URI "/hello\.bat" chain SecFilter "\&" # WEB-CGI Home Free search.cgi directory traversal attempt SecFilterSelective REQUEST_URI "/search\.cgi" chain SecFilter "letter=\.\./\.\." #campus attempt SecFilterSelective REQUEST_URI "/campus\?\|0A\|" # WEB-CGI pfdispaly.cgi arbitrary command execution attempt SecFilterSelective REQUEST_URI "/pfdispaly\.cgi\?\'" # WEB-CGI talkback.cgi directory traversal attempt SecFilterSelective REQUEST_URI "/talkbalk\.cgi" chain SecFilter "article=\.\./\.\./" # WEB-CGI technote main.cgi file directory traversal attempt SecFilterSelective REQUEST_URI "/technote/main\.cgi" chain SecFilter "\.\./\.\./" # WEB-CGI technote print.cgi directory traversal attempt SecFilterSelective REQUEST_URI "/technote/print\.cgi.*\x00" # WEB-CGI eXtropia webstore directory traversal SecFilterSelective REQUEST_URI "/web_store\.cgi" chain SecFilter "page=\.\./" # WEB-CGI shopping cart directory traversal SecFilterSelective REQUEST_URI "/shop\.cgi" chain SecFilter "page=\.\./" # WEB-CGI Allaire Pro Web Shell attempt SecFilterSelective REQUEST_URI "/authenticate\.cgi\?PASSWORD" chain SecFilter "config\.ini" # WEB-CGI Armada Style Master Index directory traversal SecFilterSelective REQUEST_URI "/search\.cgi\?keys" chain SecFilter "catigory=\.\./" # WEB-CGI cached_feed.cgi moreover shopping cart directory traversal SecFilterSelective REQUEST_URI "/cached_feed\.cgi" chain SecFilter "\.\./" # WEB-CGI Talentsoft Web+ exploit attempt SecFilterSelective REQUEST_URI "/webplus\.cgi\?Script=/webplus/webping/webping\.wml" # WEB-CGI txt2html.cgi directory traversal attempt SecFilterSelective REQUEST_URI "/txt2html\.cgi" chain SecFilter "/\.\./\.\./\.\./\.\./" # WEB-CGI store.cgi directory traversal attempt SecFilterSelective REQUEST_URI "/store\.cgi" chain SecFilter "\.\./" # WEB-CGI mrtg.cgi directory traversal attempt SecFilterSelective REQUEST_URI "/mrtg\.cgi" chain SecFilter "cfg=/\.\./" # WEB-CGI CCBill whereami.cgi arbitrary command execution attempt SecFilterSelective REQUEST_URI "/whereami\.cgi\?g=" # WEB-CGI WhatsUpGold instancename overflow attempt SecFilterSelective REQUEST_URI "/_maincfgret\.cgi" #Demarc SQL injection attempt SecFilterSelective REQUEST_URI "/dm/demarc.*s_key=.*\'" # WEB-MISC apache directory disclosure attempt SecFilterSelective THE_REQUEST "////////" # WEB-MISC htgrep attempt SecFilterSelective REQUEST_URI "/htgrep" chain SecFilter "hdr=/" #musicat empower attempt SecFilterSelective REQUEST_URI "/empower\?DB=" # WEB-PHP DNSTools administrator authentication bypass attempt SecFilterSelective REQUEST_URI "/dnstools\.php" chain SecFilter "user_dnstools_administrator=true" # WEB-PHP DNSTools authentication bypass attempt SecFilterSelective REQUEST_URI "/dnstools\.php" chain SecFilter "user_logged_in=true" #General phpbb_root_path vulnerabilities SecFilterSelective ARG_phpbb_root_path "((ht|f)tps?\:/|\.\./)" "id:390070,rev:1,severity:2,msg:'JITP: Generic phpbb_root_path exploit'" # WEB-PHP phpbb quick-reply.php arbitrary command attempt SecFilterSelective REQUEST_URI "/quick-reply\.php" chain SecFilter "phpbb_root_path=" # WEB-PHP Blahz-DNS dostuff.php modify user attempt SecFilterSelective REQUEST_URI "/dostuff\.php\?action=modify_user" # WEB-PHP PHP-Wiki cross site scripting attempt SecFilterSelective REQUEST_URI "/modules\.php\?*name=Wiki*\<*(script|about|applet|activex|chrome)*\>" # WEB-MISC *%0a.pl access SecFilterSelective REQUEST_URI "/*\x0a\.pl" # WEB-PHP strings overflow SecFilterSelective THE_REQUEST "\?STRENGUR" # WEB-PHP shoutbox.php directory traversal attempt SecFilterSelective REQUEST_URI "/shoutbox\.php" chain SecFilter "\.\./" # WEB-PHP b2 cafelog gm-2-b2.php remote file include attempt SecFilterSelective REQUEST_URI "/gm-2-b2\.php" chain SecFilter "b2inc=(http|https|ftp)\:/" # WEB-PHP BLNews objects.inc.php4 remote file include attempt SecFilterSelective REQUEST_URI "/objects\.inc\.php*" chain SecFilter "Server\[path\]=(http|https|ftp)\:/" # WEB-PHP ttCMS header.php remote file include attempt SecFilterSelective REQUEST_URI "/admin/templates/header\.php" chain SecFilter "admin_root=(http|https|ftp)\:/" # WEB-PHP autohtml.php directory traversal attempt SecFilterSelective REQUEST_URI "/autohtml\.php" chain SecFilter "\.\./\.\./" # WEB-PHP ttforum remote file include attempt SecFilterSelective REQUEST_URI "forum/index\.php" chain SecFilter "template=" # WEB-PHP pmachine remote file include attempt SecFilterSelective REQUEST_URI "lib\.inc\.php" chain SecFilter "pm_path=(http|https|ftp)\:/" SecFilterSelective REQUEST_URI "lib\.inc\.php.*pm_path.*(http|https|ftp)\:/" #rolis guestbook remote file include attempt SecFilterSelective REQUEST_URI "/insert\.inc\.php*path=" # IdeaBox cord.php file include SecFilterSelective REQUEST_URI "/index\.php*ideaDir*cord\.php" #IdeaBox notification.php file include SecFilterSelective REQUEST_URI "/index\.php*gorumDir*notification\.php" # WEB-PHP DCP-Portal remote file include attempt SecFilterSelective REQUEST_URI "/library/lib\.php" chain SecFilter "root=" # WEB-PHP IdeaBox cord.php file include SecFilterSelective REQUEST_URI "/index\.php" chain SecFilter "cord\.php" # WEB-PHP IdeaBox notification.php file include SecFilterSelective REQUEST_URI "/index\.php" chain SecFilter "notification\.php" # WEB-PHP Invision Board emailer.php file include SecFilterSelective REQUEST_URI "/ad_member\.php" chain SecFilter "emailer\.php" # WEB-PHP WebChat db_mysql.php file include SecFilterSelective REQUEST_URI "/defines\.php" chain SecFilter "db_mysql\.php" # WEB-PHP WebChat english.php file include SecFilterSelective REQUEST_URI "/defines\.php" chain SecFilter "english\.php" # WEB-PHP Typo3 translations.php file include SecFilterSelective REQUEST_URI "/translations\.php" chain SecFilter "ONLY=\x2e" # WEB-PHP news.php file include SecFilterSelective REQUEST_URI "/news\.php" chain SecFilter "template" # WEB-PHP YaBB SE packages.php file include SecFilterSelective REQUEST_URI "/packages\.php" chain SecFilter "packer\.php" # WEB-PHP newsPHP Language file include attempt SecFilterSelective REQUEST_URI "/nphpd\.php" chain SecFilter "LangFile" #myphpPagetool pt_config.inc file include SecFilterSelective REQUEST_URI "/doc/admin*ptinclude*pt_config\.inc" #Invision Board ipchat.php file include SecFilterSelective REQUEST_URI "/ipchat\.php*root_path*conf_global\.php" # WEB-PHP PhpGedView PGV authentication_index.php base directory manipulation attempt SecFilterSelective REQUEST_URI "/authentication_index\.php" chain SecFilter "PGV_BASE_DIRECTORY=(http|https|ftp)\:/" # WEB-PHP PhpGedView PGV functions.php base directory manipulation attempt SecFilterSelective REQUEST_URI "/functions\.php" chain SecFilter "PGV_BASE_DIRECTORY" # WEB-PHP TUTOS path disclosure attempt SecFilterSelective REQUEST_URI "/note_overview\.php" chain SecFilter "id=" # WEB-PHP PhpGedView PGV base directory manipulation SecFilterSelective REQUEST_URI "_conf\.php" chain SecFilter "PGV_BASE_DIRECTORY" #PHPBB worm sigs SecFilterSelective ARG_highlight "(\x27|%27|\x2527|%2527)" #Mailto domain search possible MyDoom.M,O SecFilterSelective REQUEST_URI "/search\?hl=en&ie=UTF-8&oe=UTF-8&q=mailto\+" chain SecFilter "Host\: www\.google\.com" #WEB-PHP EasyDynamicPages exploit SecFilterSelective REQUEST_URI "edp_relative_path=" #Calendar XSS SecFilterSelective REQUEST_URI "/(calendar|setup).php\?phpc_root_path=((http|https|ftp)\:/|<[[:space:]]*(script|about|applet|activex|chrome)*>.*(script|about|applet|activex|chrome)[[:space:]]*>)" #phpMyAdmin Export.PHP File Disclosure Vulnerability SecFilterSelective SCRIPT_FILENAME "export\.php$" chain SecFilterSelective ARG_what "\.\." #nmap version request SecFilterSelective THE_REQUEST "^(HELP|default|\||TNMP|DmdT|\:)$" #More PHPBB worms SecFilterSelective REQUEST_URI "/viewtopic\.php\?" chain SecFilterSelective ARGS "(chr|fwrite|fopen|system|echr|passthru|popen|proc_open|shell_exec|exec|proc_nice|proc_terminate|proc_get_status|proc_close|pfsockopen|leak|apache_child_terminate|posix_kill|posix_mkfifo|posix_setpgid|posix_setsid|posix_setuid|phpinfo)\(([0-9a-fA-Fx]{1,3})\)" # TIKIWIKI SecFilterSelective REQUEST_URI "/tiki-map.phtml\?mapfile=\.\./\.\./" # WEB-MISC BitKeeper arbitrary command attempt SecFilterSelective REQUEST_URI "/diffs/" chain SecFilter "\'" #awstats probe SecFilterSelective THE_REQUEST "/awstats\.pl HTTP\/(0\.9|1\.0|1\.1)$" "id:390000,rev:1,severity:2,msg:'JITP: Awstats.pl probe'" #/forum/viewtopic.php?x=http:// SecFilterSelective REQUEST_URI "/forum/viewtopic\.php\?x=(http|https|ftp)\:/" # WEB-MISC Crystal Reports crystalImageHandler.aspx directory traversal attempt SecFilterSelective REQUEST_URI "/crystalimagehandler\.aspx" chain SecFilter "dynamicimage=\.\./" #mailman 2.x path recursion attack SecFilterSelective THE_REQUEST "mailman/private/.*\.\.\./\.\.\.\.///" SecFilterSelective THE_REQUEST "/mailman/.*\.\.\./" #ftp.pl attempt SecFilterSelective REQUEST_URI "/ftp\.pl\?dir=\.\./\.\." #Tomcat server snoop access SecFilterSelective REQUEST_URI "/jsp/snp/.*\.snp" # WEB-CGI HyperSeek hsx.cgi directory traversal attempt SecFilterSelective REQUEST_URI "/hsx\.cgi.*\x00" # WEB-CGI SWSoft ASPSeek Overflow attempt SecFilterSelective REQUEST_URI "/s\.cgi" chain SecFilter "tmpl=" # WEB-CGI /wwwboard/passwd.txt access SecFilterSelective REQUEST_URI "/wwwboard/passwd\.txt" # WEB-CGI webplus directory traversal SecFilterSelective REQUEST_URI "/webplus\?script" chain SecFilter "\.\./" # WEB-CGI websendmail access SecFilterSelective REQUEST_URI "/websendmail" # WEB-CGI anaconda directory transversal attempt SecFilterSelective REQUEST_URI "/(apexec|anacondaclip)\.pl" chain SecFilter "template=\.\./" # WEB-CGI imagemap.exe overflow attempt SecFilterSelective REQUEST_URI "/imagemap\.exe\?" # WEB-CGI htmlscript attempt SecFilterSelective REQUEST_URI "/htmlscript\?\.\./\.\." # WEB-CGI nph-test-cgi access SecFilterSelective REQUEST_URI "/nph-test-cgi" # WEB-CGI rwwwshell.pl access SecFilterSelective REQUEST_URI "/rwwwshell\.pl" # WEB-CGI view-source directory traversal SecFilterSelective REQUEST_URI "/view-source" chain SecFilter "\.\./" # WEB-CGI calendar_admin.pl arbitrary command execution attempt SecFilterSelective REQUEST_URI "/calendar_admin.pl\?config=\|7C\|" # WEB-CGI bb-hist.sh attempt SecFilterSelective REQUEST_URI "/bb-hist\.sh\?HISTFILE=\.\./\.\." # WEB-CGI bb-hostscv.sh attempt SecFilterSelective REQUEST_URI "/bb-hostsvc\.sh\?HOSTSVC\?\.\./\.\." # WEB-CGI wayboard attempt SecFilterSelective REQUEST_URI "/way-board/way-board\.cgi" chain SecFilter "\.\./\.\." # WEB-CGI commerce.cgi arbitrary file access attempt SecFilterSelective REQUEST_URI "/commerce\.cgi" chain SecFilter "/\.\./" # WEB-CGI Amaya templates sendtemp.pl directory traversal attempt SecFilterSelective REQUEST_URI "/sendtemp\.pl" chain SecFilter "templ=" # WEB-CGI webspirs.cgi directory traversal attempt SecFilterSelective REQUEST_URI "/webspirs\.cgi" chain SecFilter "\.\./\.\./" # WEB-CGI auktion.cgi directory traversal attempt SecFilterSelective REQUEST_URI "/auktion\.cgi" chain SecFilter "menue=\.\./\.\./" # WEB-CGI cgiforum.pl attempt SecFilterSelective REQUEST_URI "/cgiforum\.pl\?thesection=\.\./\.\." # WEB-CGI directorypro.cgi attempt SecFilterSelective REQUEST_URI "/directorypro\.cgi" chain SecFilter "\.\./\.\." # WEB-CGI Web Shopper shopper.cgi attempt SecFilterSelective REQUEST_URI "/shopper\.cgi" chain SecFilter "newpage=\.\./" # WEB-CGI cal_make.pl directory traversal attempt SecFilterSelective REQUEST_URI "/cal_make\.pl" chain SecFilter "p0=\.\./\.\./" # WEB-CGI ttawebtop.cgi arbitrary file attempt SecFilterSelective REQUEST_URI "/ttawebtop\.cgi" chain SecFilter "pg=\.\./" # WEB-CGI ustorekeeper.pl directory traversal attempt SecFilterSelective REQUEST_URI "/ustorekeeper\.pl" chain SecFilter "file=\.\./\.\./" # WEB-CGI htsearch arbitrary configuration file attempt SecFilterSelective REQUEST_URI "/htsearch\?\-c" # WEB-CGI alibaba.pl arbitrary command execution attempt SecFilterSelective REQUEST_URI "/alibaba\.pl(\|7C\||\x7C)" # WEB-CGI AltaVista Intranet Search directory traversal attempt SecFilterSelective REQUEST_URI "/query\?mss=\.\." # WEB-CGI test.bat arbitrary command execution attempt SecFilterSelective REQUEST_URI "/test.bat(\|7C\||\x7C)" # WEB-CGI input.bat arbitrary command execution attempt SecFilterSelective REQUEST_URI "/input.bat(\|7C\||\x7C)" # WEB-CGI envout.bat arbitrary command execution attempt SecFilterSelective REQUEST_URI "/envout.bat(\|7C\||\x7C)" # WEB-CGI hello.bat arbitrary command execution attempt SecFilterSelective REQUEST_URI "/hello\.bat" chain SecFilter "\&" # WEB-CGI csSearch.cgi arbitrary command execution attempt SecFilterSelective REQUEST_URI "/csSearch\.cgi" chain SecFilter "\`" # WEB-CGI eshop.pl arbitrary commane execution attempt SecFilterSelective REQUEST_URI "/eshop\.pl\?seite=(\|3B\|\x3B)" # WEB-CGI loadpage.cgi directory traversal attempt SecFilterSelective REQUEST_URI "/loadpage\.cgi" chain SecFilter "file=\.\./" #faqmanager.cgi arbitrary file access attempt SecFilterSelective REQUEST_URI "/faqmanager\.cgi\?toc=*/" SecFilterSelective REQUEST_URI "/faqmanager\.cgi\?(cd|\;|perl|python|rpm|yum|apt-get|emerge|lynx|links|mkdir|elinks|cmd|pwd|wget|lwp-(download|request|mirror|rget)|id|uname|cvs|svn|(s|r)(cp|sh)|rexec|smbclient|t?ftp|ncftp|curl|telnet|gcc|cc|g\+\+|\./)" # WEB-CGI Home Free search.cgi directory traversal attempt SecFilterSelective REQUEST_URI "/search\.cgi" chain SecFilter "letter=\.\./\.\." # WEB-CGI pfdispaly.cgi arbitrary command execution attempt SecFilterSelective REQUEST_URI "/pfdispaly\.cgi\?'" # WEB-CGI pagelog.cgi directory traversal attempt SecFilterSelective REQUEST_URI "/pagelog\.cgi" chain SecFilter "name=\.\./" # WEB-CGI talkback.cgi directory traversal attempt SecFilterSelective REQUEST_URI "/talkbalk\.cgi" chain SecFilter "article=\.\./\.\./" # WEB-CGI emumail.cgi NULL attempt SecFilterSelective REQUEST_URI "/emumail\.cgi.*\x00" # WEB-CGI technote main.cgi file directory traversal attempt SecFilterSelective REQUEST_URI "/technote/main\.cgi" chain SecFilter "\.\./\.\./" # WEB-CGI technote print.cgi directory traversal attempt SecFilterSelective REQUEST_URI "/technote/print\.cgi.*\x00" # WEB-CGI Allaire Pro Web Shell attempt SecFilterSelective REQUEST_URI "/authenticate.cgi\?PASSWORD" chain SecFilter "config\.ini" # WEB-CGI Armada Style Master Index directory traversal SecFilterSelective REQUEST_URI "/search\.cgi\?keys" chain SecFilter "catigory=\.\./" # WEB-CGI cached_feed.cgi moreover shopping cart directory traversal SecFilterSelective REQUEST_URI "/cached_feed\.cgi" chain SecFilter "\.\./" # WEB-CGI Talentsoft Web+ exploit attempt SecFilterSelective REQUEST_URI "/webplus.cgi\?Script=/webplus/webping/webping\.wml" # WEB-CGI bizdbsearch attempt SecFilterSelective REQUEST_URI "/bizdb1-search\.cgi" chain SecFilter "mail" # WEB-CGI sojourn.cgi File attempt SecFilterSelective REQUEST_URI "/sojourn\.cgi\?cat=.*\x00" # WEB-CGI SGI InfoSearch fname attempt SecFilterSelective REQUEST_URI "/infosrch\.cgi\?" chain SecFilter "fname=" # WEB-CGI store.cgi directory traversal attempt SecFilterSelective REQUEST_URI "/store\.cgi" chain SecFilter "\.\./" # WEB-CGI SIX webboard generate.cgi attempt SecFilterSelective REQUEST_URI "/generate\.cgi" chain SecFilter "content=\.\./" # WEB-CGI story.pl arbitrary file read attempt SecFilterSelective REQUEST_URI "/story\.pl" chain SecFilter "next=\.\./" # WEB-CGI mrtg.cgi directory traversal attempt SecFilterSelective REQUEST_URI "/mrtg\.cgi" chain SecFilter "cfg=/\.\./" #alienform.cgi directory traversal attempt SecFilterSelective REQUEST_URI "/alienform\.cgi.*\.\|7C\|\./\.\|7C\|\." SecFilterSelective REQUEST_URI "/af\.cgi.*\.\|7C\|\./\.\|7C\|\." # WEB-CGI CCBill whereami.cgi arbitrary command execution attempt SecFilterSelective REQUEST_URI "/whereami\.cgi\?g=" # WEB-CGI MDaemon form2raw.cgi overflow attempt SecFilterSelective REQUEST_URI "/form2raw\.cgi" # WEB-CGI WhatsUpGold instancename overflow attempt SecFilterSelective REQUEST_URI "/_maincfgret\.cgi" #honeypot SecFilterSelective THE_REQUEST "clamav-partial " SecFilterSelective THE_REQUEST "vi\.recover " # WEB-COLDFUSION cfcache.map access SecFilterSelective REQUEST_URI "/cfcache\.map" # WEB-COLDFUSION exampleapp application.cfm SecFilterSelective REQUEST_URI "/cfdocs/exampleapp/email/application\.cfm" # WEB-COLDFUSION application.cfm access SecFilterSelective REQUEST_URI "/cfdocs/exampleapp/publish/admin/application\.cfm" # WEB-COLDFUSION getfile.cfm access SecFilterSelective REQUEST_URI "/cfdocs/exampleapp/email/getfile\.cfm" # WEB-COLDFUSION addcontent.cfm access SecFilterSelective REQUEST_URI "/cfdocs/exampleapp/publish/admin/addcontent\.cfm" # WEB-COLDFUSION administrator access SecFilterSelective REQUEST_URI "/cfide/administrator/index\.cfm" # WEB-COLDFUSION fileexists.cfm access SecFilterSelective REQUEST_URI "/cfdocs/snippets/fileexists\.cfm" # WEB-COLDFUSION exprcalc access SecFilterSelective REQUEST_URI "/cfdocs/expeval/exprcalc\.cfm" # WEB-COLDFUSION parks access SecFilterSelective REQUEST_URI "/cfdocs/examples/parks/detail\.cfm" # WEB-COLDFUSION cfappman access SecFilterSelective REQUEST_URI "/cfappman/index\.cfm" # WEB-COLDFUSION beaninfo access SecFilterSelective REQUEST_URI "/cfdocs/examples/cvbeans/beaninfo\.cfm" # WEB-COLDFUSION evaluate.cfm access SecFilterSelective REQUEST_URI "/cfdocs/snippets/evaluate\.cfm" # WEB-COLDFUSION expeval access SecFilterSelective REQUEST_URI "/cfdocs/expeval/" # WEB-COLDFUSION displayfile access SecFilterSelective REQUEST_URI "/cfdocs/expeval/displayopenedfile\.cfm" # WEB-COLDFUSION mainframeset access SecFilterSelective REQUEST_URI "/cfdocs/examples/mainframeset\.cfm" # WEB-COLDFUSION exampleapp access SecFilterSelective REQUEST_URI "/cfdocs/exampleapp/" # WEB-COLDFUSION snippets attempt SecFilterSelective REQUEST_URI "/cfdocs/snippets/" # WEB-COLDFUSION cfmlsyntaxcheck.cfm access SecFilterSelective REQUEST_URI "/cfdocs/cfmlsyntaxcheck\.cfm" # WEB-COLDFUSION application.cfm access SecFilterSelective REQUEST_URI "/application\.cfm" # WEB-COLDFUSION onrequestend.cfm access SecFilterSelective REQUEST_URI "/onrequestend\.cfm" # WEB-COLDFUSION startstop DOS access SecFilterSelective REQUEST_URI "/cfide/administrator/startstop\.html" # WEB-COLDFUSION gettempdirectory.cfm access SecFilterSelective REQUEST_URI "/cfdocs/snippets/gettempdirectory\.cfm" # WEB-COLDFUSION sendmail.cfm access SecFilterSelective REQUEST_URI "/sendmail\.cfm" # WEB-COLDFUSION ?Mode=debug attempt #SecFilterSelective REQUEST_URI "Mode=debug" # WEB-MISC Tomcat view source attempt SecFilterSelective THE_REQUEST "\x252ejsp" # WEB-MISC unify eWave ServletExec upload SecFilterSelective THE_REQUEST "/servlet/com\.unify\.servletexec\.UploadServlet" # WEB-MISC Talentsoft Web+ Source Code view access SecFilterSelective REQUEST_URI "/webplus\.exe\?script=test\.wml" # WEB-MISC ftp.pl attempt SecFilterSelective REQUEST_URI "/ftp\.pl\?dir=\.\./\.\." # WEB-MISC apache source.asp file access SecFilterSelective REQUEST_URI "/site/eg/source\.asp" # WEB-MISC Tomcat server exploit access SecFilterSelective REQUEST_URI "/contextAdmin/contextAdmin\.html" # WEB-MISC Ecommerce import.txt access SecFilterSelective REQUEST_URI "/orders/import\.txt" # WEB-MISC Domino catalog.nsf access SecFilterSelective REQUEST_URI "/catalog\.nsf" # WEB-MISC Domino domcfg.nsf access SecFilterSelective REQUEST_URI "/domcfg\.nsf" # WEB-MISC Domino domlog.nsf access SecFilterSelective REQUEST_URI "/domlog\.nsf" # WEB-MISC Domino log.nsf access SecFilterSelective REQUEST_URI "/log\.nsf" # WEB-MISC Domino names.nsf access SecFilterSelective REQUEST_URI "/names\.nsf" # WEB-MISC Domino mab.nsf access SecFilterSelective REQUEST_URI "/mab\.nsf" # WEB-MISC Domino cersvr.nsf access SecFilterSelective REQUEST_URI "/cersvr\.nsf" # WEB-MISC Domino setup.nsf access SecFilterSelective REQUEST_URI "/setup\.nsf" # WEB-MISC Domino statrep.nsf access SecFilterSelective REQUEST_URI "/statrep\.nsf" # WEB-MISC Domino webadmin.nsf access SecFilterSelective REQUEST_URI "/webadmin\.nsf" # WEB-MISC Domino events4.nsf access SecFilterSelective REQUEST_URI "/events4\.nsf" # WEB-MISC Domino ntsync4.nsf access SecFilterSelective REQUEST_URI "/ntsync4\.nsf" # WEB-MISC Domino collect4.nsf access SecFilterSelective REQUEST_URI "/collect4\.nsf" # WEB-MISC Domino mailw46.nsf access SecFilterSelective REQUEST_URI "/mailw46\.nsf" # WEB-MISC Domino bookmark.nsf access SecFilterSelective REQUEST_URI "/bookmark\.nsf" # WEB-MISC Domino agentrunner.nsf access SecFilterSelective REQUEST_URI "/agentrunner\.nsf" # WEB-MISC Domino mail.box access #SecFilterSelective REQUEST_URI "/mail.box" # WEB-MISC Ecommerce checks.txt access SecFilterSelective REQUEST_URI "/orders/checks\.txt" # WEB-MISC mall log order access SecFilterSelective REQUEST_URI "/mall_log_files/order\.log" # WEB-MISC ROADS search.pl attempt SecFilterSelective REQUEST_URI "/ROADS/cgi-bin/search\.pl" chain SecFilter "form=" # WEB-MISC SWEditServlet directory traversal attempt SecFilterSelective REQUEST_URI "/SWEditServlet" chain SecFilter "template=\.\./\.\./\.\./" # WEB-MISC whisker HEAD/./ #SecFilter "HEAD/./" # WEB-MISC RBS ISP /newuser directory traversal attempt SecFilterSelective REQUEST_URI "/newuser\?Image=\.\./\.\." # WEB-MISC PCCS mysql database admin tool access SecFilterSelective REQUEST_URI "pccsmysqladm/incs/dbconnect\.inc" # WEB-MISC ans.pl attempt SecFilterSelective REQUEST_URI "/ans.pl\?p=\.\./\.\./" # WEB-MISC Demarc SQL injection attempt SecFilterSelective REQUEST_URI "/dm/demarc" chain SecFilter "\'" # WEB-MISC philboard_admin.asp authentication bypass attempt SecFilterSelective REQUEST_URI "/philboard_admin\.asp" chain SecFilter "philboard_admin=True" # WEB-PHP Phorum /support/common.php access SecFilterSelective REQUEST_URI "/support/common\.php" # WEB-PHP rolis guestbook remote file include attempt SecFilterSelective REQUEST_URI "/insert\.inc\.php" chain SecFilter "path=" # book.cgi arbitrary command execution attempt SecFilterSelective REQUEST_URI "/book\.cgi.*current=\|7C\|" # WEB-PHP gallery remote file include attempt SecFilterSelective REQUEST_URI "/setup/" chain SecFilter "GALLERY_BASEDIR=(http|https|ftp)\:/" #Needinit remote file include attempt SecFilterSelective REQUEST_URI "/needinit\.php\?" chain SecFilter "GALLERY_BASEDIR=(http|https|ftp)\:/" # WEB-PHP IdeaBox cord.php file include SecFilterSelective REQUEST_URI "/index\.php" chain SecFilter "cord\.php" # WEB-PHP Invision Board ipchat.php file include SecFilterSelective REQUEST_URI "/ipchat\.php" chain SecFilter "conf_global\.php" # WEB-PHP myphpPagetool pt_config.inc file include SecFilterSelective REQUEST_URI "/doc/admin" chain SecFilter "pt_config\.inc" # WEB-PHP YaBB SE packages.php file include SecFilterSelective REQUEST_URI "/packages\.php" chain SecFilter "packer\.php" # WEB-PHP PhpGedView PGV authentication_index.php base directory manipulation attempt SecFilterSelective REQUEST_URI "/authentication_index\.php" chain SecFilter "PGV_BASE_DIRECTORY" # WEB-PHP PhpGedView PGV functions.php base directory manipulation attempt SecFilterSelective REQUEST_URI "/functions\.php" chain SecFilter "PGV_BASE_DIRECTORY" # WEB-PHP PhpGedView PGV config_gedcom.php base directory manipulation attempt SecFilterSelective REQUEST_URI "/config_gedcom\.php" chain SecFilter "PGV_BASE_DIRECTORY" # WEB-PHP PhpGedView PGV base directory manipulation SecFilterSelective REQUEST_URI "_conf\.php" chain SecFilter "PGV_BASE_DIRECTORY" # WEB-PHP WAnewsletter newsletter.php file include attempt SecFilterSelective REQUEST_URI "newsletter\.php" chain SecFilter "start\.php" # WEB-PHP Opt-X header.php remote file include attempt SecFilterSelective REQUEST_URI "/header\.php" chain SecFilter "systempath=" #webdav searcg attack SecFilterSelective REQUEST_URI "/_vti_bin/_vti_aut/fp30reg\.dll" #/auth.php?path=http://[attacker]/ SecFilterSelective REQUEST_URI "/auth.php\?path=(http|https|ftp)\:/" SecFilterSelective REQUEST_URI "/dforum/nav\.php3\?page=<[[:space:]]*(script|about|applet|activex|chrome)+.*(script|about|applet|activex|chrome)[[:space:]]*>" #phpMyAdmin path vln SecFilterSelective REQUEST_URI "/phpMyAdmin/css/phpmyadmin\.css\.php\?GLOBALS\[cfg\]\[ThemePath\]=(/|.*\.\./)" #PHPBB full path disclosure SecFilterSelective REQUEST_URI "phpBB/db/oracle\.php" SecFilterSelective REQUEST_URI "forum/db/oracle\.php" SecFilterSelective REQUEST_URI "forums/db/oracle\.php" #PHP Form Mail Script File Incusion vuln SecFilterSelective REQUEST_URI "/inc/formmail\.inc\.php\?script_root=(http|https|ftp)\:/" #Download Center Lite File Incusion vuln SecFilterSelective REQUEST_URI "/inc/download_center_lite\.inc\.php\?script_root=(http|https|ftp)\:/" #/modules/mod_mainmenu.php?mosConfig_absolute_path=http:// SecFilterSelective REQUEST_URI "/modules/mod_mainmenu\.php\?mosConfig_absolute_path=(http|https|ftp)\:/" #phpWebLog command execution SecFilterSelective REQUEST_URI "/init\.inc\.php\?G_PATH=(http|https|ftp)\:/" SecFilterSelective REQUEST_URI "/backend/addons/links/index\.php\?PATH=(http|https|ftp)\:/" #mcNews command execution SecFilterSelective REQUEST_URI "/mcNews/admin/header\.php\?skinfile=(http|https|ftp)\:/" #phpbb SecFilterSelective REQUEST_URI "admin/admin_styles\.php\?mode=addnew\&install_to=\.\./\.\./" #votebox SecFilterSelective REQUEST_URI "/votebox\.php\?VoteBoxPath=(http|https|ftp)\:/" #phpAdsNew path disclosure SecFilterSelective REQUEST_URI "/libraries/lib-xmlrpcs.inc\.php" SecFilterSelective REQUEST_URI "/maintenance/maintenance-activation\.php" SecFilterSelective REQUEST_URI "/maintenance/maintenance-cleantables\.php" SecFilterSelective REQUEST_URI "/maintenance/maintenance-autotargeting\.php" SecFilterSelective REQUEST_URI "/maintenance/maintenance-reports\.php" SecFilterSelective REQUEST_URI "/misc/backwards\x20compatibility/phpads\.php" SecFilterSelective REQUEST_URI "/misc/backwards\x20compatibility/remotehtmlview\.php" SecFilterSelective REQUEST_URI "/misc/backwards\x20compatibility/click\.php" SecFilterSelective REQUEST_URI "/adframe\.php\?refresh=securityreason\.com\'\>" #include cgi command exec SecFilterSelective REQUEST_URI "/includer\.cgi\?=\|" #citrusDB #adjust these to your system, you might need to upload SecFilterSelective REQUEST_URI "tools/index\.php\?load=\.\./\.\./" SecFilterSelective REQUEST_URI "citrusdb/tools/index\.php\?load=importcc\&submit=on" SecFilterSelective REQUEST_URI "/citrusdb/tools/uploadcc\.php" #awstats vulns SecFilterSelective REQUEST_URI "/awstats\.pl\?(configdir|update|pluginmode|cgi)=(\||echo|\:system\()" SecFilterSelective REQUEST_URI "/awstats\.pl\?(debug=1|pluginmode=rawlog\&loadplugin=rawlog|update=1\&logfile=\|)" SecFilterSelective REQUEST_URI "/awstats\.pl\?[^\r\n]*logfile=\|" SecFilterSelective REQUEST_URI "/awstats\.pl\?configdir=" SecFilterSelective REQUEST_URI "awstats\.pl\?" chain SecFilterSelective ARGS "(debug|configdir|perl|chmod|exec|print|cgi)" #yabb SecFilterSelective REQUEST_URI "/YaBB\.pl\?action=usersrecentposts\;username=\|(http|https|ftp)\:/)" SecFilterSelective THE_REQUEST "/privmsg\.php" chain SecFilter "\|(http|https|ftp)\:/)" # Remote File Inclusion Vulnerability in phpWebLog SecFilterSelective REQUEST_URI "/include/init\.inc\.php\?G_PATH=(http|https|ftp)\:/" SecFilterSelective REQUEST_URI "addons/links/index\.php\?PATH=(http|https|ftp)\:/" #Multiple Vulnerabilities in ProjectBB SecFilterSelective REQUEST_URI "/divers\.php\?action=liste\&liste=\&desc=\&pages=(\<(javascript|script|about|applet|activex|chrome)*\>|(http|https|ftp)\:/)" SecFilterSelective REQUEST_URI "/divers\.php\?action=liste\&liste=(\<(javascript|script|about|applet|activex|chrome)*\>|(http|https|ftp)\:/)" SecFilterSelective REQUEST_URI "/Zip/divers\.php\?action =liste&liste=email&desc=.*\'" #WebChat english.php or db_mysql.php file include SecFilterSelective REQUEST_URI "/defines\.php*WEBCHATPATH*(db_mysql\.php|english\.php)" #Cross-Site Scripting Vulnerability in D-Forum SecFilterSelective REQUEST_URI "/nav\.php3\?page=(\<(javascript|script|about|applet|activex|chrome)*\>|(http|https|ftp)\:/)" #Multiple Vulnerabilities in auraCMS SecFilterSelective REQUEST_URI "/index\.php\?query=(\<(javascript|script|about|applet|activex|chrome)*\>|(http|https|ftp)\:/).*\&pilih=search" SecFilterSelective REQUEST_URI "/hits\.php\?hits=(\<(javascript|script|about|applet|activex|chrome)*\>|(http|https|ftp)\:/)" SecFilterSelective REQUEST_URI "/counter\.php\?theCount=(\<(javascript|script|about|applet|activex|chrome)*\>|(http|https|ftp)\:/)" #vBulletin Remote Command Execution Attempt SecFilterSelective REQUEST_URI "/forumdisplay\.php?[^\r\n]*comma=[^\r\n\x26]*system\x28.*\x29/Ui" SecFilterSelective REQUEST_URI "/forumdisplay\.php\?" chain SecFilter "\.system\(.+\)\." SecFilterSelective REQUEST_URI "/forumdisplay\.php\?*comma=" #PHPNuke general XSS attempt #/modules.php?name=News&file=article&sid=1&optionbox= SecFilterSelective REQUEST_URI "/modules\.php\?*name=*\<*(script|about|applet|activex|chrome)*\>" SecFilterSelective REQUEST_URI "/modules\.php\?op=modload&name=News&file=article&sid=*\<*(script|about|applet|activex|chrome)*\>" # PHPNuke SQL injection attempt SecFilterSelective REQUEST_URI "/modules\.php\?*name=Search*instory=" SecFilterSelective REQUEST_URI "/modules\.php\?*name=(Search|Web_Links).*\'" #EasyDynamicPages exploit SecFilterSelective THE_REQUEST "edp_relative_path=" #Readfile.tcl Access SecFilterSelective REQUEST_URI "/readfile\.tcl\?file=" #phpnuke sql insertion SecFilterSelective REQUEST_URI "/modules\.php*name=Forums.*file=viewtopic*/forum=.*\'/" #WAnewsletter newsletter.php file include attempt SecFilterSelective REQUEST_URI "newsletter\.php*waroot*start\.php" # Typo3 translations.php file include SecFilterSelective REQUEST_URI "/translations\.php*ONLY" #PHP-Nuke remote file include attempt SecFilterSelective REQUEST_URI "/index\.php*file=*(http|https|ftp)\:/" #PayPal Storefront remote file include attempt SecFilterSelective REQUEST_URI "do=ext*/page=(http|https|ftp)\:/" #PHPOpenChat SecFilterSelective REQUEST_URI "/poc_loginform\.php\?phpbb_root_path=(http|https|ftp)\:/" SecFilterSelective REQUEST_URI "/poc\.php\?phpbb_root_path=(http|https|ftp)\:/" SecFilterSelective REQUEST_URI "/poc\.php\?poc_root_path=(http|https|ftp)\:/" SecFilterSelective REQUEST_URI "/ENGLISH_poc\.php\?poc_root_path=(http|https|ftp)\:/" SecFilterSelective REQUEST_URI "/poc\.php\?sourcedir=(http|https|ftp)\:/" #ACS Blog Search.ASP Cross-Site Scripting Vulnerability SecFilterSelective REQUEST_URI "/search\.asp\?search=.*iframe\+src.*((javascript|script|about|applet|activex|chrome)*\>|http|https|ftp)\:/" #mcNews Remote command execution SecFilterSelective REQUEST_URI "/admin/install\.php\?l=(http|https|ftp)\:/" #mailman XSS SecFilterSelective THE_REQUEST "/mailman/.*\?.*info=*<[[:space:]]*(script|about|applet|activex|chrome)*>.*(script|about|applet|activex|chrome)[[:space:]]*>" #Macromedia SiteSpring XSS SecFilterSelective THE_REQUEST "/error/500error\.jsp.*et=*<[[:space:]]*(script|about|applet|activex|chrome)*>.*(script|about|applet|activex|chrome)[[:space:]]*>" #OWA phishing redirect SecFilterSelective REQUEST_URI "/exchweb/bin/auth/owalogon\.asp\?url=(http|https)\:/" #ads.cgi command execution attempt SecFilterSelective REQUEST_URI "/ads\.cgi.*file=.*\.\./\.\./" #webdist.cgi arbitrary command attemp SecFilterSelective REQUEST_URI "/webdist\.cgi.*distloc=(\|3B\||\x3B)" #enter_bug.cgi arbitrary command attempt SecFilterSelective REQUEST_URI "/enter_bug\.cgi.*who.*(\|3B\||\x3B)" #cross site scripting HTML Image tag set to javascript attempt SecFilterSelective THE_REQUEST "img src=javascript" #b2 arbitrary command execution attempt SecFilterSelective REQUEST_URI "/b2-include/.*b2inc.*http(\|3A\|//|\x3A)" #tomcat servlet mapping XSS SecFilterSelective THE_REQUEST "/servlet/.*/org\.apache\." #RUNCMS,Exoops,CIAMOS highlight file access hole SecFilterSelective REQUEST_URI "/class/debug/highlight\.php\?file=(/|\.\./)" #TRG/CzarNews News Script Include File Hole Lets Remote Users Execute Arbitrary Commands SecFilterSelective REQUEST_URI "/install/(article|authorall|comment|display|displayall.)\.php\?dir=(http|https|ftp):/" #zpanel XSS SecFilterSelective REQUEST_URI "/zpanel\.php\?page=.*((javascript|script|about|applet|activex|chrome)*\>|(http|https|ftp)\:/)" #zpanel SQL injection SecFilterSelective REQUEST_URI "/zpanel\.php\?page=.*\'" #Phorum HTTP Response Splitting Vulnerability SecFilterSelective REQUEST_URI "/search\.php\?forum_id=.*\&search=.*\&body=.*Content-Length\:.*HTTP/1\.0.*Content-Type\:.*Content-Length\:" #Subdreamer Light Global Variables SQL Injection Vulnerability SecFilterSelective REQUEST_URI "/index\.php\?categoryid=.*\&.*_sectionid=.*\&.*_imageid=.*\'" #PhotoPost Pro SecFilterSelective REQUEST_URI "/showgallery\.php\?cat=[0-9].*\&page=(http|https|ftp)\:/" SecFilterSelective REQUEST_URI "/showgallery\.php\?si=(http|https|ftp)\:/" SecFilterSelective REQUEST_URI "/showgallery\.php\?ppuser=[0-9].*\&cat=(http|https|ftp)\:/" SecFilterSelective REQUEST_URI "/showgallery\.php\?cat=[0-9].*\'" SecFilterSelective REQUEST_URI "/showgallery\.php\?ppuser=[0-9].*\'.*\&cat=" #betaparticle blog Discloses Database to Remote Users #and Lets Remote Users Upload/Delete Arbitrary Files SecFilterSelective REQUEST_URI "/bp/database/dbBlogMX\.mdb" SecFilterSelective REQUEST_URI "/Blog\.mdb" #Kayako eSupport Remote Cross Site Scripting Vulnerability SecFilterSelective REQUEST_URI "/eSupport/index.php\?_a=knowledgebase\&_j=questiondetails\&_i=[0-9].*((javascript|script|about|applet|activex|chrome)*\>|(http|https|ftp)\:/)" SecFilterSelective REQUEST_URI "/eSupport/index.php\?_a=knowledgebase\&_j=questionprint\&_i=[0-9].*((javascript|script|about|applet|activex|chrome)*\>|(http|https|ftp)\:/)" SecFilterSelective REQUEST_URI "/eSupport/index.php\?_a=troubleshooter\&_c=[0-9].*((javascript|script|about|applet|activex|chrome)*\>|(http|https|ftp)\:/)" SecFilterSelective REQUEST_URI "/eSupport/index.php\?_a=knowledgebase\&_j=subcat\&_i=[0-9].*((javascript|script|about|applet|activex|chrome)*\>|(http|https|ftp)\:/)" #phpSysInfo XSS vulns SecFilterSelective REQUEST_URI "/index\.php\?sensor_program=.*((javascript|script|about|applet|activex|chrome)*\>|(http|https|ftp)\:/)" SecFilterSelective REQUEST_URI "/includes/system_footer\.php\?text[template]=\"\>.*((javascript|script|about|applet|activex|chrome)*\>|(http|https|ftp)\:/)" SecFilterSelective REQUEST_URI "/includes/system_footer\.php\?hide_picklist=.*\&VERSION=\|(http|https|ftp)\:/)" #DigitalHive Remote Unathenticated Software Re-install and Cross-Site Scripting Vulnerabilities SecFilterSelective REQUEST_URI "/base\.php\?page=forum/msg\.php-afs-1-\"/\>\" SecFilterSelective REQUEST_URI "/hive/base\.php\?page=membres\.php\&mt=\"/\>\" #Topic Calendar Mod for phpBB Cross-Site Scripting Attack SecFilterSelective REQUEST_URI "/calendar_scheduler\.php\?start=.*((javascript|script|about|applet|activex|chrome)*\>|(http|https|ftp)\:/)" #phpSysInfo Cross-Site Scripting Vulnerabilities SecFilterSelective REQUEST_URI "/index\.php\?sensor_program=.*((javascript|script|about|applet|activex|chrome)*\>|(http|https|ftp)\:/)" SecFilterSelective REQUEST_URI "/includes/system_footer\.php\?text.*=\"\>.*((javascript|script|about|applet|activex|chrome)*\>|(http|https|ftp)\:/)" SecFilterSelective REQUEST_URI "/includes/system_footer\.php\?text[template]=\"\>.*((javascript|script|about|applet|activex|chrome)*\>|(http|https|ftp)\:/)" SecFilterSelective REQUEST_URI "/includes/system_footer\.php\?hide_picklist=.*=\