@abtnode/router-provider 1.16.38-beta-20250115-235439-bb5a1c1b → 1.16.38-beta-20250118-033334-2da05ae8

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (51) hide show
  1. package/lib/nginx/includes/security/crs4/rules/REQUEST-900-EXCLUSION-RULES-BEFORE-CRS.conf.example +200 -0
  2. package/lib/nginx/includes/security/crs4/rules/REQUEST-901-INITIALIZATION.conf +470 -0
  3. package/lib/nginx/includes/security/crs4/rules/REQUEST-905-COMMON-EXCEPTIONS.conf +57 -0
  4. package/lib/nginx/includes/security/crs4/rules/REQUEST-911-METHOD-ENFORCEMENT.conf +76 -0
  5. package/lib/nginx/includes/security/crs4/rules/REQUEST-913-SCANNER-DETECTION.conf +86 -0
  6. package/lib/nginx/includes/security/crs4/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf +1915 -0
  7. package/lib/nginx/includes/security/crs4/rules/REQUEST-921-PROTOCOL-ATTACK.conf +558 -0
  8. package/lib/nginx/includes/security/crs4/rules/REQUEST-922-MULTIPART-ATTACK.conf +120 -0
  9. package/lib/nginx/includes/security/crs4/rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf +203 -0
  10. package/lib/nginx/includes/security/crs4/rules/REQUEST-931-APPLICATION-ATTACK-RFI.conf +189 -0
  11. package/lib/nginx/includes/security/crs4/rules/REQUEST-932-APPLICATION-ATTACK-RCE.conf +1875 -0
  12. package/lib/nginx/includes/security/crs4/rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf +774 -0
  13. package/lib/nginx/includes/security/crs4/rules/REQUEST-934-APPLICATION-ATTACK-GENERIC.conf +366 -0
  14. package/lib/nginx/includes/security/crs4/rules/REQUEST-941-APPLICATION-ATTACK-XSS.conf +1071 -0
  15. package/lib/nginx/includes/security/crs4/rules/REQUEST-942-APPLICATION-ATTACK-SQLI.conf +1978 -0
  16. package/lib/nginx/includes/security/crs4/rules/REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION.conf +132 -0
  17. package/lib/nginx/includes/security/crs4/rules/REQUEST-944-APPLICATION-ATTACK-JAVA.conf +463 -0
  18. package/lib/nginx/includes/security/crs4/rules/REQUEST-949-BLOCKING-EVALUATION.conf +270 -0
  19. package/lib/nginx/includes/security/crs4/rules/RESPONSE-950-DATA-LEAKAGES.conf +156 -0
  20. package/lib/nginx/includes/security/crs4/rules/RESPONSE-951-DATA-LEAKAGES-SQL.conf +417 -0
  21. package/lib/nginx/includes/security/crs4/rules/RESPONSE-952-DATA-LEAKAGES-JAVA.conf +108 -0
  22. package/lib/nginx/includes/security/crs4/rules/RESPONSE-953-DATA-LEAKAGES-PHP.conf +158 -0
  23. package/lib/nginx/includes/security/crs4/rules/RESPONSE-954-DATA-LEAKAGES-IIS.conf +152 -0
  24. package/lib/nginx/includes/security/crs4/rules/RESPONSE-955-WEB-SHELLS.conf +558 -0
  25. package/lib/nginx/includes/security/crs4/rules/RESPONSE-959-BLOCKING-EVALUATION.conf +280 -0
  26. package/lib/nginx/includes/security/crs4/rules/RESPONSE-980-CORRELATION.conf +138 -0
  27. package/lib/nginx/includes/security/crs4/rules/RESPONSE-999-EXCLUSION-RULES-AFTER-CRS.conf.example +76 -0
  28. package/lib/nginx/includes/security/crs4/rules/iis-errors.data +59 -0
  29. package/lib/nginx/includes/security/crs4/rules/java-classes.data +64 -0
  30. package/lib/nginx/includes/security/crs4/rules/java-code-leakages.data +17 -0
  31. package/lib/nginx/includes/security/crs4/rules/java-errors.data +10 -0
  32. package/lib/nginx/includes/security/crs4/rules/lfi-os-files.data +722 -0
  33. package/lib/nginx/includes/security/crs4/rules/php-config-directives.data +571 -0
  34. package/lib/nginx/includes/security/crs4/rules/php-errors-pl2.data +7 -0
  35. package/lib/nginx/includes/security/crs4/rules/php-errors.data +2147 -0
  36. package/lib/nginx/includes/security/crs4/rules/php-function-names-933150.data +245 -0
  37. package/lib/nginx/includes/security/crs4/rules/php-function-names-933151.data +2201 -0
  38. package/lib/nginx/includes/security/crs4/rules/php-variables.data +30 -0
  39. package/lib/nginx/includes/security/crs4/rules/restricted-files.data +284 -0
  40. package/lib/nginx/includes/security/crs4/rules/restricted-upload.data +177 -0
  41. package/lib/nginx/includes/security/crs4/rules/scanners-user-agents.data +119 -0
  42. package/lib/nginx/includes/security/crs4/rules/sql-errors.data +172 -0
  43. package/lib/nginx/includes/security/crs4/rules/ssrf.data +177 -0
  44. package/lib/nginx/includes/security/crs4/rules/unix-shell.data +670 -0
  45. package/lib/nginx/includes/security/crs4/rules/web-shells-php.data +167 -0
  46. package/lib/nginx/includes/security/crs4/rules/windows-powershell-commands.data +425 -0
  47. package/lib/nginx/includes/security/unicode.mapping +96 -0
  48. package/lib/nginx/index.js +50 -3
  49. package/lib/nginx/templates/security/crs4/crs-setup.conf.js +857 -0
  50. package/lib/nginx/templates/security/modsecurity.conf.js +244 -0
  51. package/package.json +7 -6
@@ -0,0 +1,152 @@
1
+ # ------------------------------------------------------------------------
2
+ # OWASP CRS ver.4.9.0
3
+ # Copyright (c) 2006-2020 Trustwave and contributors. All rights reserved.
4
+ # Copyright (c) 2021-2024 CRS project. All rights reserved.
5
+ #
6
+ # The OWASP CRS is distributed under
7
+ # Apache Software License (ASL) version 2
8
+ # Please see the enclosed LICENSE file for full details.
9
+ # ------------------------------------------------------------------------
10
+
11
+ #
12
+ # -= Paranoia Level 0 (empty) =- (apply unconditionally)
13
+ #
14
+
15
+ # Skip all rules if RESPONSE_BODY is compressed.
16
+ SecRule RESPONSE_HEADERS:Content-Encoding "@pm gzip compress deflate br zstd" \
17
+ "id:954010,\
18
+ phase:4,\
19
+ pass,\
20
+ nolog,\
21
+ tag:'OWASP_CRS',\
22
+ ver:'OWASP_CRS/4.9.0',\
23
+ skipAfter:END-RESPONSE-954-DATA-LEAKAGES-IIS"
24
+
25
+ SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 1" "id:954011,phase:3,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.9.0',skipAfter:END-RESPONSE-954-DATA-LEAKAGES-IIS"
26
+ SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 1" "id:954012,phase:4,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.9.0',skipAfter:END-RESPONSE-954-DATA-LEAKAGES-IIS"
27
+ #
28
+ # -= Paranoia Level 1 (default) =- (apply only when tx.detection_paranoia_level is sufficiently high: 1 or higher)
29
+ #
30
+
31
+ # IIS default location
32
+ SecRule RESPONSE_BODY "@rx [a-z]:\x5cinetpub\b" \
33
+ "id:954100,\
34
+ phase:4,\
35
+ block,\
36
+ capture,\
37
+ t:none,t:lowercase,\
38
+ msg:'Disclosure of IIS install location',\
39
+ logdata:'Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}',\
40
+ tag:'application-multi',\
41
+ tag:'language-multi',\
42
+ tag:'platform-iis',\
43
+ tag:'platform-windows',\
44
+ tag:'attack-disclosure',\
45
+ tag:'paranoia-level/1',\
46
+ tag:'OWASP_CRS',\
47
+ tag:'capec/1000/118/116',\
48
+ ver:'OWASP_CRS/4.9.0',\
49
+ severity:'ERROR',\
50
+ setvar:'tx.outbound_anomaly_score_pl1=+%{tx.error_anomaly_score}'"
51
+
52
+ SecRule RESPONSE_BODY "@rx (?:Microsoft OLE DB Provider for SQL Server(?:</font>.{1,20}?error '800(?:04005|40e31)'.{1,40}?Timeout expired| \(0x80040e31\)<br>Timeout expired<br>)|<h1>internal server error</h1>.*?<h2>part of the server has crashed or it has a configuration error\.</h2>|cannot connect to the server: timed out)" \
53
+ "id:954110,\
54
+ phase:4,\
55
+ block,\
56
+ capture,\
57
+ t:none,\
58
+ msg:'Application Availability Error',\
59
+ logdata:'Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}',\
60
+ tag:'application-multi',\
61
+ tag:'language-multi',\
62
+ tag:'platform-iis',\
63
+ tag:'platform-windows',\
64
+ tag:'attack-disclosure',\
65
+ tag:'paranoia-level/1',\
66
+ tag:'OWASP_CRS',\
67
+ tag:'capec/1000/118/116',\
68
+ tag:'PCI/6.5.6',\
69
+ ver:'OWASP_CRS/4.9.0',\
70
+ severity:'ERROR',\
71
+ setvar:'tx.outbound_anomaly_score_pl1=+%{tx.error_anomaly_score}'"
72
+
73
+ #
74
+ # IIS Errors leakage
75
+ #
76
+ SecRule RESPONSE_BODY "@pmFromFile iis-errors.data" \
77
+ "id:954120,\
78
+ phase:4,\
79
+ block,\
80
+ capture,\
81
+ t:none,\
82
+ msg:'IIS Information Leakage',\
83
+ logdata:'Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}',\
84
+ tag:'application-multi',\
85
+ tag:'language-multi',\
86
+ tag:'platform-iis',\
87
+ tag:'platform-windows',\
88
+ tag:'attack-disclosure',\
89
+ tag:'paranoia-level/1',\
90
+ tag:'OWASP_CRS',\
91
+ tag:'capec/1000/118/116',\
92
+ tag:'PCI/6.5.6',\
93
+ ver:'OWASP_CRS/4.9.0',\
94
+ severity:'ERROR',\
95
+ setvar:'tx.outbound_anomaly_score_pl1=+%{tx.error_anomaly_score}'"
96
+
97
+
98
+ SecRule RESPONSE_STATUS "!@rx ^404$" \
99
+ "id:954130,\
100
+ phase:4,\
101
+ block,\
102
+ capture,\
103
+ t:none,\
104
+ msg:'IIS Information Leakage',\
105
+ logdata:'Matched Data: %{TX.0} found within %{MATCHED_VAR_NAME}',\
106
+ tag:'application-multi',\
107
+ tag:'language-multi',\
108
+ tag:'platform-iis',\
109
+ tag:'platform-windows',\
110
+ tag:'attack-disclosure',\
111
+ tag:'paranoia-level/1',\
112
+ tag:'OWASP_CRS',\
113
+ tag:'capec/1000/118/116',\
114
+ tag:'PCI/6.5.6',\
115
+ ver:'OWASP_CRS/4.9.0',\
116
+ severity:'ERROR',\
117
+ chain"
118
+ SecRule RESPONSE_BODY "@rx \bServer Error in.{0,50}?\bApplication\b" \
119
+ "capture,\
120
+ t:none,\
121
+ setvar:'tx.outbound_anomaly_score_pl1=+%{tx.error_anomaly_score}'"
122
+
123
+
124
+
125
+ SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 2" "id:954013,phase:3,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.9.0',skipAfter:END-RESPONSE-954-DATA-LEAKAGES-IIS"
126
+ SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 2" "id:954014,phase:4,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.9.0',skipAfter:END-RESPONSE-954-DATA-LEAKAGES-IIS"
127
+ #
128
+ # -= Paranoia Level 2 =- (apply only when tx.detection_paranoia_level is sufficiently high: 2 or higher)
129
+ #
130
+
131
+
132
+
133
+ SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 3" "id:954015,phase:3,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.9.0',skipAfter:END-RESPONSE-954-DATA-LEAKAGES-IIS"
134
+ SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 3" "id:954016,phase:4,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.9.0',skipAfter:END-RESPONSE-954-DATA-LEAKAGES-IIS"
135
+ #
136
+ # -= Paranoia Level 3 =- (apply only when tx.detection_paranoia_level is sufficiently high: 3 or higher)
137
+ #
138
+
139
+
140
+
141
+ SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 4" "id:954017,phase:3,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.9.0',skipAfter:END-RESPONSE-954-DATA-LEAKAGES-IIS"
142
+ SecRule TX:DETECTION_PARANOIA_LEVEL "@lt 4" "id:954018,phase:4,pass,nolog,tag:'OWASP_CRS',ver:'OWASP_CRS/4.9.0',skipAfter:END-RESPONSE-954-DATA-LEAKAGES-IIS"
143
+ #
144
+ # -= Paranoia Level 4 =- (apply only when tx.detection_paranoia_level is sufficiently high: 4 or higher)
145
+ #
146
+
147
+
148
+
149
+ #
150
+ # -= Paranoia Levels Finished =-
151
+ #
152
+ SecMarker "END-RESPONSE-954-DATA-LEAKAGES-IIS"