Skip to content

Commit 85e1415

Browse files
committed
remove default modsec rules in lsws config
1 parent e5f5693 commit 85e1415

File tree

2 files changed

+2
-38
lines changed

2 files changed

+2
-38
lines changed

install/litespeed/httpd_config.xml

Lines changed: 1 addition & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -125,19 +125,7 @@
125125
<name>XSS attack</name>
126126
<ruleSetAction>log,deny,status:403,msg:'XSS attack'</ruleSetAction>
127127
<enabled>1</enabled>
128-
<ruleSet>SecFilterSelective ARGS &quot;(alert|expression|eval|url)[[:space:]]*\(&quot;
129-
SecFilterSelective ARGS &quot;(&amp;\{.+\}|(&amp;#[[0-9a-fA-F]]|\x5cx[0-9a-fA-F]){2})&quot;
130-
131-
SecFilterSelective ARGS &quot;((javascript|vbscript):|style[[:space:]]*=)&quot;
132-
SecFilterSelective ARGS &quot;(fromCharCode|http-equiv|&lt;.+&gt;|innerHTML|dynsrc|--&gt;)&quot;
133-
SecFilterSelective ARGS &quot;document\.(body|cookie|location|write)&quot;
134-
135-
SecFilterSelective ARGS_VALUES &quot;jsessionid|phpsessid|onReadyStateChange|xmlHttp&quot;
136-
137-
SecFilterSelective ARGS &quot;&lt;(applet|div|embed|iframe|img|meta|object|script|textarea)&quot;
138-
139-
# JavaScript event handlers
140-
SecFilterSelective ARGS &quot;on(Abort|Blur|Click|DblClick|DragDrop|Error|Focus|KeyUp|KeyDown|KeyPrerss|Load|Mouse(Down|Out|Over|Up)|Move|Reset|Resize|Select|Submit|Unload)&quot;</ruleSet>
128+
<ruleSet></ruleSet>
141129
</censorshipRuleSet>
142130
<censorshipRuleSet>
143131
<name>SQL injection</name>

serverStatus/litespeed/httpd_config.xml

Lines changed: 1 addition & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -125,31 +125,7 @@
125125
<name>XSS attack</name>
126126
<ruleSetAction>log,deny,status:403,msg:'XSS attack'</ruleSetAction>
127127
<enabled>1</enabled>
128-
<ruleSet>SecFilterSelective ARGS &quot;(alert|expression|eval|url)[[:space:]]*\(&quot;
129-
SecFilterSelective ARGS &quot;(&amp;\{.+\}|(&amp;#[[0-9a-fA-F]]|\x5cx[0-9a-fA-F]){2})&quot;
130-
131-
SecFilterSelective ARGS &quot;((javascript|vbscript):|style[[:space:]]*=)&quot;
132-
SecFilterSelective ARGS &quot;(fromCharCode|http-equiv|&lt;.+&gt;|innerHTML|dynsrc|--&gt;)&quot;
133-
SecFilterSelective ARGS &quot;document\.(body|cookie|location|write)&quot;
134-
135-
SecFilterSelective ARGS_VALUES &quot;jsessionid|phpsessid|onReadyStateChange|xmlHttp&quot;
136-
137-
SecFilterSelective ARGS &quot;&lt;(applet|div|embed|iframe|img|meta|object|script|textarea)&quot;
138-
139-
# JavaScript event handlers
140-
SecFilterSelective ARGS &quot;on(Abort|Blur|Click|DblClick|DragDrop|Error|Focus|KeyUp|KeyDown|KeyPrerss|Load|Mouse(Down|Out|Over|Up)|Move|Reset|Resize|Select|Submit|Unload)&quot;</ruleSet>
141-
</censorshipRuleSet>
142-
<censorshipRuleSet>
143-
<name>SQL injection</name>
144-
<ruleSetAction>log,pass,msg:'SQL Injection attack'</ruleSetAction>
145-
<enabled>1</enabled>
146-
<ruleSet>#SQL generic
147-
SecFilterSelective ARGS &quot;drop[[:space:]]+(database|table|column|procedure)&quot;
148-
SecFilterSelective ARGS &quot;delete[[:space:]]+from|create[[:space:]]+table|update.+set.+=|insert[[:space:]]+into.+values&quot;
149-
SecFilterSelective ARGS &quot;select.+from|bulk[[:space:]]+insert|union.+select|alter[[:space:]]+table&quot;
150-
SecFilterSelective ARGS &quot;or.+1[[:space:]]*=[[:space:]]1|or 1=1--'|'.+--&quot;
151-
152-
SecFilterSelective ARGS &quot;into[[:space:]]+outfile|load[[:space:]]+data|/\*.+\*/&quot;</ruleSet>
128+
<ruleSet></ruleSet>
153129
</censorshipRuleSet>
154130
<accessDenyDir>
155131
<dir>/</dir>

0 commit comments

Comments
 (0)