mirror of
https://github.com/Safe3/uusec-waf.git
synced 2025-10-04 15:01:55 +08:00
### Feature Updates **Interface & Management** - Redesigned main program and management interface with improved aesthetics and usability, supports UI language switching (English/Chinese) - Added Rule Collections functionality: Create custom rule templates for batch configuration - Introduced whitelist rules that terminate further rule matching upon success - UUSEC WAF Rules API intelligent suggestions during advanced rule editing:ml-citation - New plugin management supporting hot-reloaded plugins to extend WAF capabilities **Protocol & Optimization** - Supports streaming responses for continuous data push (e.g., LLM stream outputs) - Enables Host header modification during proxying for upstream service access - Search engine validation: `waf.searchEngineValid(dns,ip,ua)` prevents high-frequency rules from affecting SEO indexing - Interception log report generation (HTML/PDF exports) - Automatic rotation of UUSEC WAF error/access logs to prevent performance issues **Security & Infrastructure** - Expanded free SSL certificate support: HTTP-01 & DNS-01 verification across 50+ domain providers - Customizable advanced WAF settings: HTTP2, GZIP, HTTP Caching, SSL protocols, etc - Cluster configuration: Manage UUSEC WAF nodes and ML servers via web UI
61 lines
No EOL
1.2 KiB
Lua
61 lines
No EOL
1.2 KiB
Lua
--[[
|
|
Rule name: Command injection detection
|
|
Filtering stage: Request phase
|
|
Threat level: Critical
|
|
Rule description: Detect shell command injection attacks in URLs, cookies, and forms. The RCE semantic detection engine can be used to detect various deformations, such as cat$IFS/etc/os-release or c$()at /e??/p?????, etc.
|
|
--]]
|
|
|
|
|
|
local checkRCE = waf.checkRCE
|
|
local kvFilter = waf.kvFilter
|
|
|
|
local function rMatch(v)
|
|
if checkRCE(v, 1) then
|
|
return true, v
|
|
end
|
|
return false
|
|
end
|
|
|
|
local function rMatch1(v)
|
|
if checkRCE(v, 0) then
|
|
return true, v
|
|
end
|
|
return false
|
|
end
|
|
|
|
local function rMatch2(v)
|
|
if checkRCE(v, 2) then
|
|
return true, v
|
|
end
|
|
return false
|
|
end
|
|
|
|
local form = waf.form
|
|
if form then
|
|
local m, d = kvFilter(form["FORM"], rMatch, true)
|
|
if m then
|
|
return m, d, true
|
|
end
|
|
end
|
|
|
|
local queryString = waf.queryString
|
|
if queryString then
|
|
local m, d = kvFilter(queryString, rMatch2)
|
|
if m then
|
|
return m, d, true
|
|
end
|
|
end
|
|
|
|
local cookies = waf.cookies
|
|
if cookies then
|
|
local m, d = kvFilter(cookies, rMatch1, true)
|
|
if m then
|
|
return m, d, true
|
|
end
|
|
end
|
|
|
|
local m, d = kvFilter(waf.reqHeaders, rMatch)
|
|
if m then
|
|
return m, d, true
|
|
end
|
|
return false |