Compare commits
No commits in common. "main" and "1.0.0" have entirely different histories.
@ -9,19 +9,13 @@
|
||||
# Plugin name: gitea-proxy-rule-exclusions
|
||||
# Plugin description: OWASP CRS 3rd party plugin for Gitea via proxy
|
||||
# Rule ID block base: 92,000 - 92,999
|
||||
# Plugin version: 1.1.0
|
||||
# Plugin version: 1.0.0
|
||||
|
||||
# Documentation can be found here:
|
||||
# https://git.demus.dk/demus/gitea-proxy-rule-exclusions-plugin.git
|
||||
|
||||
# Generic rule to disable plugin
|
||||
SecRule TX:gitea-proxy-rule-exclusions-plugin_enabled "@eq 0" \
|
||||
"id:92001,\
|
||||
phase:1,\
|
||||
pass,\
|
||||
nolog,\
|
||||
ver:'gitea-proxy-rule-exclusions-plugin/1.2.0',\
|
||||
ctl:ruleRemoveById=92002-92999"
|
||||
SecRule TX:gitea-proxy-rule-exclusions-plugin_enabled "@eq 0" "id:92001,phase:1,pass,nolog,ctl:ruleRemoveById=92002-92999"
|
||||
|
||||
#
|
||||
# [ Local CRS initialization ]
|
||||
@ -36,7 +30,7 @@ SecRule &TX:allowed_request_content_type "@eq 0" \
|
||||
phase:1,\
|
||||
pass,\
|
||||
nolog,\
|
||||
ver:'gitea-proxy-rule-exclusions-plugin/1.2.0',\
|
||||
ver:'gitea-proxy-rule-exclusions-plugin/1.0.0',\
|
||||
setvar:'tx.allowed_request_content_type=|application/x-www-form-urlencoded| |multipart/form-data| |multipart/related| |text/xml| |application/xml| |application/soap+xml| |application/json| |application/cloudevents+json| |application/cloudevents-batch+json|'"
|
||||
|
||||
# Modify CRS rule 901164
|
||||
@ -45,7 +39,7 @@ SecRule &TX:restricted_extensions "@eq 0" \
|
||||
phase:1,\
|
||||
pass,\
|
||||
nolog,\
|
||||
ver:'gitea-proxy-rule-exclusions-plugin/1.2.0',\
|
||||
ver:'gitea-proxy-rule-exclusions-plugin/1.0.0',\
|
||||
setvar:'tx.restricted_extensions=.backup/ .bak/ .cdx/ .cer/ .dat/ .db/ .dbf/ .dll/ .dos/ .htr/ .htw/ .ida/ .idc/ .idq/ .key/ .printer/ .rdb/ .swp/ .sys/'"
|
||||
|
||||
# Modify CRS rule 901165. git-upload-pack has it's own content-type and uses the content-encoding header
|
||||
@ -54,27 +48,7 @@ SecRule REQUEST_URI "@endsWith git-upload-pack" \
|
||||
phase:1,\
|
||||
pass,\
|
||||
t:none,\
|
||||
ver:'gitea-proxy-rule-exclusions-plugin/1.2.0',\
|
||||
ver:'gitea-proxy-rule-exclusions-plugin/1.0.0',\
|
||||
nolog,\
|
||||
setvar:'tx.allowed_request_content_type=%{TX.allowed_request_content_type} |application/x-git-upload-pack-request|',\
|
||||
setvar:'tx.allowed_request_content_type=%{tx.allowed_request_content_type} |application/x-git-upload-pack-request|',\
|
||||
setvar:'tx.restricted_headers_basic=/proxy/ /lock-token/ /content-range/ /if/ /x-http-method-override/ /x-http-method/ /x-method-override/'"
|
||||
|
||||
# Provide a way to whitelist filenames that are in restricted-files.data
|
||||
SecRule REQUEST_FILENAME "@pmFromFile gitea-proxy-whitelisted-files.data" \
|
||||
"id:92020,\
|
||||
phase:1,\
|
||||
pass,\
|
||||
nolog,\
|
||||
t:none,\
|
||||
ver:'gitea-proxy-rule-exclusions-plugin/1.2.0',\
|
||||
ctl:ruleRemoveById=930130"
|
||||
|
||||
# Gitea is written in Go, so disable PHP-related rules, as a PHP git project would cause false positives
|
||||
SecAction \
|
||||
"id:92040,\
|
||||
phase:1,\
|
||||
pass,\
|
||||
log,\
|
||||
t:none,\
|
||||
ver:'gitea-proxy-rule-exclusions-plugin/1.2.0',\
|
||||
ctl:ruleRemoveByTag=language-php"
|
||||
|
@ -9,7 +9,7 @@
|
||||
# Plugin name: gitea-proxy-rule-exclusions
|
||||
# Plugin description: OWASP CRS 3rd party plugin for Gitea via proxy
|
||||
# Rule ID block base: 92,000 - 92,999
|
||||
# Plugin version: 1.1.0
|
||||
# Plugin version: 1.0.0
|
||||
|
||||
# Documentation can be found here:
|
||||
# https://git.demus.dk/demus/gitea-proxy-rule-exclusions-plugin.git
|
||||
@ -38,5 +38,6 @@
|
||||
# phase:1,\
|
||||
# pass,\
|
||||
# nolog,\
|
||||
# ver:'gitea-proxy-rule-exclusions-plugin/1.1.0',\
|
||||
# ver:'gitea-proxy-rule-exclusions-plugin/1.0.0',\
|
||||
# setvar:'tx.gitea-proxy-rule-exclusions-plugin_enabled=0'"
|
||||
|
||||
|
@ -1,7 +0,0 @@
|
||||
# Rule 930130 returns 403 Forbidden to requests for restricted filenames
|
||||
# See restricted-files.data for the list of restricted filenames
|
||||
# Add exceptions here
|
||||
|
||||
# Git files are expected on a git server
|
||||
.gitignore
|
||||
.gitattributes
|
Loading…
Reference in New Issue
Block a user