mirror of
https://github.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker.git
synced 2025-09-03 11:10:47 +00:00
UPDATE bad-referrer-words.conf include file [ci skip]
This commit is contained in:
parent
9c38932b8e
commit
ad53f0f867
1 changed files with 27 additions and 12 deletions
|
@ -1,10 +1,10 @@
|
||||||
# EDIT THIS FILE AS YOU LIKE TO ADD OR REMOVE ANY BAD WORDS YOU WANT TO SCAN FOR ###
|
# EDIT THIS FILE AS YOU LIKE TO ADD OR REMOVE ANY BAD WORDS YOU WANT TO SCAN FOR ###
|
||||||
|
|
||||||
### VERSION INFORMATION #
|
### VERSION INFORMATION #
|
||||||
###################################################
|
#--------------------------------------------------
|
||||||
### Version: V4.2019.09
|
### Version: V4.2019.10
|
||||||
### Updated: 2019-06-25
|
### Updated: 2019-06-28
|
||||||
###################################################
|
#--------------------------------------------------
|
||||||
### VERSION INFORMATION ##
|
### VERSION INFORMATION ##
|
||||||
|
|
||||||
##############################################################################
|
##############################################################################
|
||||||
|
@ -25,13 +25,13 @@
|
||||||
# completely blank if you do not want your Nginx Blocker to include scanning for bad words within urls or referrer string
|
# completely blank if you do not want your Nginx Blocker to include scanning for bad words within urls or referrer string
|
||||||
# Only add one entry per line
|
# Only add one entry per line
|
||||||
|
|
||||||
# *******************************
|
# -------------------------------
|
||||||
# !!! WARNING WARNING WARNING !!!
|
# !!! WARNING WARNING WARNING !!!
|
||||||
# *******************************
|
# -------------------------------
|
||||||
|
|
||||||
# ***************************************
|
# ---------------------------------------
|
||||||
# PLEASE BE VERY CAREFUL HOW YOU USE THIS
|
# PLEASE BE VERY CAREFUL HOW YOU USE THIS
|
||||||
# ***************************************
|
# ---------------------------------------
|
||||||
# Here is an example of how one supposed bad word can cause your whole site to go down.
|
# Here is an example of how one supposed bad word can cause your whole site to go down.
|
||||||
# An issue was logged where the users own domain name was specialisteparquet.com
|
# An issue was logged where the users own domain name was specialisteparquet.com
|
||||||
# Because this list contained the word "cialis" it was detected within his domain name causing
|
# Because this list contained the word "cialis" it was detected within his domain name causing
|
||||||
|
@ -42,9 +42,9 @@
|
||||||
|
|
||||||
# Think very carefully before you add any word here
|
# Think very carefully before you add any word here
|
||||||
|
|
||||||
# *****************************************************************************************
|
# -----------------------------------------------------------------------------------------
|
||||||
# PLEASE MAKE SURE that you use word regex boundaries to avoid false positive detection !!!
|
# PLEASE MAKE SURE that you use word regex boundaries to avoid false positive detection !!!
|
||||||
# *****************************************************************************************
|
# -----------------------------------------------------------------------------------------
|
||||||
|
|
||||||
# BY DEFAULT ALL THE EXAMPLES BELOW ARE COMMENTED OUT AND HENCE NOT ENABLED
|
# BY DEFAULT ALL THE EXAMPLES BELOW ARE COMMENTED OUT AND HENCE NOT ENABLED
|
||||||
|
|
||||||
|
@ -69,9 +69,24 @@
|
||||||
# "~*(?:\b)webfuck(?:\b|)" 1;
|
# "~*(?:\b)webfuck(?:\b|)" 1;
|
||||||
# "~*(?:\b)xxxrus(?:\b|)" 1;
|
# "~*(?:\b)xxxrus(?:\b|)" 1;
|
||||||
# "~*(?:\b)zeroredirect(?:\b|)" 1;
|
# "~*(?:\b)zeroredirect(?:\b|)" 1;
|
||||||
|
# "~*(?:\b|)x22(?:\b|)" 1; (in this string if your own domain name was sex22.com it would be blocked)
|
||||||
|
|
||||||
|
|
||||||
# Here is a list of unsanitary words to be in a referrer string - these are used in various injection attacks
|
# Here is a list of unsanitary words used in referrer strings - used in various injection attacks
|
||||||
|
# THE RULES BELOW ARE ENABLED BY DEFAULT
|
||||||
# You can disable this default list by switching the values to 0
|
# You can disable this default list by switching the values to 0
|
||||||
|
|
||||||
"~*(?:\b)mb_ereg_replace(?:\b|)" 1;
|
"~*(?:\b|)mb_ereg_replace(?:\b|)" 1;
|
||||||
|
|
||||||
|
# -----------
|
||||||
|
# PLEASE NOTE
|
||||||
|
# -----------
|
||||||
|
|
||||||
|
# If you whitelist your own domain in whitelist-domains.conf and your own domain is passed in the referrer string with an attack string it will NOT be blocked.
|
||||||
|
|
||||||
|
# --------
|
||||||
|
# EXAMPLE:
|
||||||
|
# --------
|
||||||
|
# This string "http://yourwebsite.com/?s=/index/%5Cthink%5Capp/invokefunction&function=call_user_func_array&vars[0]=file_put_contents&vars[1][]=gqopu.php&vars[1][]=<?php mb_ereg_replace('.*',@$_REQUEST[_], '', 'e');?>$"
|
||||||
|
# contains the above 'mb_ereg_replace" attack string
|
||||||
|
# If your domain is whitelisted in whitelist-domains.conf this string will NOT be detected
|
||||||
|
|
Loading…
Add table
Reference in a new issue