サイト管理者
なみかわみやこ
この文書の現在のバージョンと選択したバージョンの差分を表示します。
|
linux:apache:mod_security [2013/01/15 03:05] miyako 作成 |
linux:apache:mod_security [2013/01/15 03:08] (現在) miyako [初期検出項目] |
||
|---|---|---|---|
| ライン 25: | ライン 25: | ||
| * modsecurity_crs_20_protocol_violations.conf | * modsecurity_crs_20_protocol_violations.conf | ||
| - | Invalid HTTP Request Line | + | <note>Invalid HTTP Request Line |
| HTTP Request Smuggling Attack | HTTP Request Smuggling Attack | ||
| + | |||
| Request Body Parsing Failed | Request Body Parsing Failed | ||
| + | |||
| Content-Length HTTP header is not numeric | Content-Length HTTP header is not numeric | ||
| + | |||
| GET or HEAD requests with bodies | GET or HEAD requests with bodies | ||
| + | |||
| POST request must have a Content-Length header | POST request must have a Content-Length header | ||
| + | |||
| ModSecurity does not support transfer encodings | ModSecurity does not support transfer encodings | ||
| + | |||
| URL Encoding Abuse Attack Attempt | URL Encoding Abuse Attack Attempt | ||
| + | |||
| Unicode Full/Half Width Abuse Attack Attempt | Unicode Full/Half Width Abuse Attack Attempt | ||
| + | |||
| Proxy access attempt | Proxy access attempt | ||
| - | Invalid character in request | + | |
| + | Invalid character in request</note> | ||
| * modsecurity_crs_21_protocol_anomalies.conf | * modsecurity_crs_21_protocol_anomalies.conf | ||
| - | Request Missing a Host Header | + | <note>Request Missing a Host Header |
| Request Missing an Accept Header | Request Missing an Accept Header | ||
| + | |||
| Request Missing a User Agent Header | Request Missing a User Agent Header | ||
| + | |||
| Request Containing Content, but Missing Content-Type header | Request Containing Content, but Missing Content-Type header | ||
| + | |||
| Host header is a numeric IP address | Host header is a numeric IP address | ||
| - | Invalid request | ||
| - | modsecurity_crs_23_request_limits.conf | ||
| - | Too many arguments in request | + | Invalid request</note> |
| - | modsecurity_crs_30_http_policy.conf | + | |
| + | * modsecurity_crs_23_request_limits.conf | ||
| + | |||
| + | <note>Too many arguments in request</note> | ||
| + | |||
| + | * modsecurity_crs_30_http_policy.conf | ||
| + | |||
| + | <note>Method is not allowed by policy | ||
| - | Method is not allowed by policy | ||
| Request content type is not allowed by policy | Request content type is not allowed by policy | ||
| + | |||
| HTTP protocol version is not allowed by policy | HTTP protocol version is not allowed by policy | ||
| + | |||
| URL file extension is restricted by policy | URL file extension is restricted by policy | ||
| + | |||
| HTTP header is restricted by policy | HTTP header is restricted by policy | ||
| - | ModSecurity does not support content encodings | + | |
| + | ModSecurity does not support content encodings</note> | ||
| * modsecurity_crs_35_bad_robots.conf | * modsecurity_crs_35_bad_robots.conf | ||
| - | Request Indicates a Security Scanner Scanned the Site | + | <note>Request Indicates a Security Scanner Scanned the Site |
| Rogue web site crawler | Rogue web site crawler | ||
| - | Request Indicates an automated program explored the site | + | |
| + | Request Indicates an automated program explored the site</note> | ||
| * modsecurity_crs_40_generic_attacks.conf | * modsecurity_crs_40_generic_attacks.conf | ||
| - | Session Fixation | + | <note>Session Fixation |
| Blind SQL Injection Attack | Blind SQL Injection Attack | ||
| + | |||
| SQL Injection Attack | SQL Injection Attack | ||
| + | |||
| Cross-site Scripting (XSS) Attack | Cross-site Scripting (XSS) Attack | ||
| + | |||
| Remote File Access Attempt | Remote File Access Attempt | ||
| + | |||
| System Command Access | System Command Access | ||
| + | |||
| System Command Injection | System Command Injection | ||
| + | |||
| Injection of Undocumented ColdFusion Tags | Injection of Undocumented ColdFusion Tags | ||
| + | |||
| LDAP Injection Attack | LDAP Injection Attack | ||
| + | |||
| SSI injection Attack | SSI injection Attack | ||
| + | |||
| PHP Injection Attack | PHP Injection Attack | ||
| + | |||
| Persistent Universal PDF XSS attack | Persistent Universal PDF XSS attack | ||
| + | |||
| Email Injection Attack | Email Injection Attack | ||
| - | HTTP Response Splitting Attack | + | |
| + | HTTP Response Splitting Attack</note> | ||
| * modsecurity_crs_45_trojans.conf | * modsecurity_crs_45_trojans.conf | ||
| - | Backdoor access | + | <note>Backdoor access</note> |
| * modsecurity_crs_50_outbound.conf | * modsecurity_crs_50_outbound.conf | ||
| - | Statistics Information Leakage | + | <note>Statistics Information Leakage |
| SQL Information Leakage | SQL Information Leakage | ||
| + | |||
| IIS Information Leakage | IIS Information Leakage | ||
| + | |||
| Zope Information Leakage | Zope Information Leakage | ||
| + | |||
| Cold Fusion Information Leakage | Cold Fusion Information Leakage | ||
| + | |||
| PHP Information Leakage | PHP Information Leakage | ||
| + | |||
| ISA server existence revealed | ISA server existence revealed | ||
| + | |||
| Microsoft Office document properties leakage | Microsoft Office document properties leakage | ||
| + | |||
| Directory Listing | Directory Listing | ||
| + | |||
| ASP/JSP source code leakage | ASP/JSP source code leakage | ||
| + | |||
| PHP source code leakage | PHP source code leakage | ||
| + | |||
| Cold Fusion source code leakage | Cold Fusion source code leakage | ||
| + | |||
| IIS installed in default location | IIS installed in default location | ||
| + | |||
| The application is not available | The application is not available | ||
| + | |||
| WebLogic information disclosure | WebLogic information disclosure | ||
| - | File or Directory Names Leakage | + | |
| + | File or Directory Names Leakage</note> | ||