File Manager
Upload
Current Directory: /home/lartcid/public_html/journal.lartc.id
[Back]
..
[Open]
Hapus
Rename
.htaccess
[Edit]
Hapus
Rename
.well-known
[Open]
Hapus
Rename
README.md
[Edit]
Hapus
Rename
api
[Open]
Hapus
Rename
cache
[Open]
Hapus
Rename
cgi-bin
[Open]
Hapus
Rename
classes
[Open]
Hapus
Rename
config.TEMPLATE.inc.php
[Edit]
Hapus
Rename
config.inc.php
[Edit]
Hapus
Rename
controllers
[Open]
Hapus
Rename
cypress.json
[Edit]
Hapus
Rename
dbscripts
[Open]
Hapus
Rename
docs
[Open]
Hapus
Rename
error_log
[Edit]
Hapus
Rename
favicon.ico
[Edit]
Hapus
Rename
index.php
[Edit]
Hapus
Rename
js
[Open]
Hapus
Rename
lib
[Open]
Hapus
Rename
locale
[Open]
Hapus
Rename
mini.php
[Edit]
Hapus
Rename
pages
[Open]
Hapus
Rename
php.ini
[Edit]
Hapus
Rename
plugins
[Open]
Hapus
Rename
public
[Open]
Hapus
Rename
registry
[Open]
Hapus
Rename
scheduledTaskLogs
[Open]
Hapus
Rename
schemas
[Open]
Hapus
Rename
styles
[Open]
Hapus
Rename
templates
[Open]
Hapus
Rename
tools
[Open]
Hapus
Rename
Edit File
# ------------------------------------------------------ # Imunify360 ModSecurity Rules # Copyright (C) 2024 CloudLinux Inc All right reserved # The Imunify360 ModSecurity Rules is distributed under # IMUNIFY360 LICENSE AGREEMENT # ------------------------------------------------------ # Imunify360 ModSecurity Joomla! Ruleset # DEFA-1819 SecRule REQUEST_METHOD "@rx ^POST$" "id:77140901,chain,phase:2,block,log,severity:2,t:none,t:normalizePath,msg:'IM360 WAF: Joomla simplefileupload component File Upload Vulnerability||MVN:%{MATCHED_VAR_NAME}||MV:%{MATCHED_VAR}||T:APACHE||',tag:'joomla_plugin'" SecRule REQUEST_FILENAME "@endsWith /modules/mod_simplefileuploadv1.3/elements/udd.php" "chain,t:none,t:normalizePath" SecRule FILES "@rx (?i)\.(?:h?php[\ds]?|pht[m]?|s?p?html?|swf|xap|phar|inc|ctp|pl|pgif|cgi|htaccess|module|exe|js|suspected|ico)(?:\W|$)" "t:none,t:urlDecodeUni" # DEFA-1819 SecRule REQUEST_METHOD "@rx ^POST$" "id:77140902,chain,phase:2,block,log,severity:2,t:none,t:normalizePath,msg:'IM360 WAF: Joomla com_facileforms component File Upload Vulnerability||MVN:%{MATCHED_VAR_NAME}||MV:%{MATCHED_VAR}||T:APACHE||',tag:'joomla_plugin'" SecRule REQUEST_FILENAME "@endsWith /components/com_facileforms/libraries/jquery/uploadify.php" "chain,t:none,t:normalizePath" SecRule FILES "@rx (?i)\.(?:h?php[\ds]?|pht[m]?|s?p?html?|swf|xap|phar|inc|ctp|pl|pgif|cgi|htaccess|module|exe|js|suspected|ico)(?:\W|$)" "t:none,t:urlDecodeUni" # DEFA-1819 SecRule REQUEST_METHOD "@rx ^POST$" "id:77140911,chain,phase:2,block,log,severity:2,t:none,t:normalizePath,msg:'IM360 WAF: Joomla! com_extplorer Components File Upload Vulnerability||MVN:%{MATCHED_VAR_NAME}||T:APACHE||MV:%{MATCHED_VAR}||',tag:'joomla_plugin'" SecRule REQUEST_FILENAME "@endsWith components/com_extplorer/uploadhandler.php" "chain,t:none,t:normalizePath" SecRule FILES "@rx (?i)\.(?:h?php[\ds]?|pht[m]?|s?p?html?|swf|xap|phar|inc|ctp|pl|pgif|cgi|htaccess|module|exe|js|suspected|ico)(?:\W|$)" "t:none,t:urlDecodeUni" # DEFA-1908 SecRule REQUEST_METHOD "@rx POST" "id:77140929,chain,phase:2,block,log,severity:2,t:none,msg:'IM360 WAF: Joomla com_rokdownloads Arbitrary File Upload Vulnerability||MVN:%{MATCHED_VAR_NAME}||T:APACHE||MV:%{MATCHED_VAR}||',tag:'joomla_core'" SecRule REQUEST_FILENAME "@endsWith com_rokdownloads/assets/uploadhandler.php" "chain,t:none,t:normalizePath" SecRule FILES "@rx (\.htaccess|\.(pht|phtml|php\d?)$)" "t:lowercase" # DEFA-1909 SecRule REQUEST_METHOD "@rx POST" "id:77140930,chain,phase:2,block,log,severity:2,t:none,msg:'IM360 WAF: Joomla com_jbcatalog Arbitrary File Upload Vulnerability||MVN:%{MATCHED_VAR_NAME}||T:APACHE||MV:%{MATCHED_VAR}||',tag:'service_im360'" SecRule REQUEST_URI "@rx com_jbcatalog/libraries/jsupload/server/php" "chain,t:none,t:normalizePath" SecRule FILES "@rx (\.htaccess|\.(pht|phtml|php\d?)$)" "t:lowercase" # DEFA-1912 SecRule REQUEST_HEADERS:User-Agent|REQUEST_HEADERS:X-Forwarded-For "@rx JDatabaseDriverMysql" "id:77140932,phase:2,block,log,severity:2,t:none,t:urlDecodeUni,msg:'IM360 WAF: Object Injection RCE vulnerability in Joomla (CVE-2015-8562)||MVN:%{MATCHED_VAR_NAME}||T:APACHE||MV:%{MATCHED_VAR}||',tag:'service_im360',tag:'joomla_core'" SecRule REQUEST_METHOD "@rx ^POST$" "chain,id:77141002,phase:2,block,log,severity:2,t:none,t:urlDecodeUni,msg:'IM360 WAF: Path traversal vulnerability in com_foxcontact component for Joomla!||MVN:%{MATCHED_VAR_NAME}||T:APACHE||MV:%{MATCHED_VAR}||SC:%{SCRIPT_FILENAME}||',tag:'service_im360'" SecRule REQUEST_FILENAME "@rx uploader\.php$" "chain,t:none,t:lowercase,t:urlDecodeUni,t:removeWhitespace,t:normalizePath" SecRule REQUEST_FILENAME "@contains /com_foxcontact/lib/" "chain,t:none,t:lowercase,t:removeWhitespace,t:normalizePath" SecRule &ARGS:cid "@gt 0" "chain,t:none" SecRule &ARGS:mid "@gt 0" "chain,t:none" SecRule ARGS:qqfile "@rx \.\.\/" "t:none,t:lowercase,t:urlDecodeUni,t:removeWhitespace,t:normalizePath" # DEFA-2241 SecRule REQUEST_FILENAME "@endsWith /modules/tdpsthemeoptionpanel/tdpsthemeoptionpanelAjax.php" "id:77141003,chain,phase:2,block,log,severity:2,t:urlDecodeUni,t:removeWhitespace,t:normalizePath,msg:'IM360 WAF: File upload vulnerability in WooCommerce plugin for WordPress||MVN:%{MATCHED_VAR_NAME}||T:APACHE||MV:%{MATCHED_VAR}||',tag:'service_i360custom',tag:'joomla_plugin'" SecRule FILES "@rx (\.htaccess|\.(pht|phtml|php\d?)$)" "t:none,t:lowercase,t:urlDecodeUni,t:removeWhitespace" # DEFA-2242 SecRule REQUEST_FILENAME "@endsWith /modules/pk_vertflexmenu/ajax/upload.php" "id:77141004,chain,phase:2,block,log,severity:2,t:urlDecodeUni,t:removeWhitespace,t:normalizePath,msg:'IM360 WAF: File upload vulnerability in WooCommerce plugin for WordPress||MVN:%{MATCHED_VAR_NAME}||T:APACHE||MV:%{MATCHED_VAR}||',tag:'service_i360custom',tag:'joomla_plugin'" SecRule FILES "@rx (\.htaccess|\.(pht|phtml|php\d?)$)" "t:none,t:lowercase,t:urlDecodeUni,t:removeWhitespace" # DEFA-2746 SecRule REQUEST_METHOD "@rx ^POST$" "id:77142145,chain,phase:2,block,log,severity:2,t:none,t:normalizePath,msg:'IM360 WAF: Joomla com_rokdownloads path traversal Vulnerability||MVN:%{MATCHED_VAR_NAME}||T:APACHE||MV:%{MATCHED_VAR}||',tag:'service_im360'" SecRule REQUEST_FILENAME "@endsWith com_rokdownloads/assets/uploadhandler.php" "chain,t:none,t:normalizePath" SecRule ARGS "@rx \.\.\/" "t:urlDecodeUni,t:removeWhitespace,t:normalizePath" # DEFA-2746 SecRule REQUEST_METHOD "@rx ^POST$" "id:77142147,chain,phase:2,block,log,severity:2,t:none,t:normalizePath,msg:'IM360 WAF: Joomla com_oziogallery path traversal Vulnerability||MVN:%{MATCHED_VAR_NAME}||T:APACHE||MV:%{MATCHED_VAR}||',tag:'service_im360'" SecRule REQUEST_URI "@rx \/components\/com_oziogallery\/imagin\/scripts_ralcr\/filesystem\/writeToFile\.php" "chain,t:none,t:urlDecodeUni,t:normalizePath,t:removeWhitespace" SecRule ARGS:path "@rx \.\.\/" "t:urlDecodeUni,t:removeWhitespace,t:normalizePath" SecRule REQUEST_METHOD "@pm GET POST" "id:77222520,chain,msg:'IM360 WAF: Unauthorized account creation and modification in Joomla! before 3.6.4 (CVE-2016-8870 CVE-2016-9836)||MVN:%{MATCHED_VAR_NAME}||MV:%{MATCHED_VAR}||T:APACHE||',phase:2,block,log,t:none,severity:2,tag:'joomla_core'" SecRule ARGS:task "@streq user.register" "chain,t:none,t:lowercase" SecRule REQUEST_FILENAME "@contains /component/users/" "t:none,t:urlDecodeUni,t:normalizePath,t:lowercase" SecRule REQUEST_FILENAME "@contains /images/stories/" "id:77240000,chain,msg:'IM360 WAF: Protecting Joomla folder||MVN:%{MATCHED_VAR_NAME}||MV:%{MATCHED_VAR}||T:APACHE||',phase:2,block,t:none,t:urlDecodeUni,t:lowercase,t:normalizePath,severity:2,tag:'joomla_core'" SecRule REQUEST_FILENAME "@endsWith .php" "t:none,t:urlDecodeUni,t:lowercase" # DEFA-3987 SecRule &ARGS:option "@lt 1" "id:77316871,pass,phase:2,nolog,severity:5,skipAfter:MARKER_option,msg:'IM360 WAF: ARGS page optimization||T:APACHE||',tag:'noshow',tag:'service_gen'" SecRule REQUEST_METHOD "@pm GET POST" "id:77222900,chain,msg:'IM360 WAF: Arbitrary File Download vulnerability in Jtag Members Directory 5.3.7 component for Joomla (CVE-2018-6008)||MVN:%{MATCHED_VAR_NAME}||MV:%{MATCHED_VAR}||T:APACHE||',phase:2,block,log,t:none,severity:2,tag:'joomla_plugin'" SecRule ARGS:option "@streq com_jtagmembersdirectory" "chain,t:none,t:urlDecodeUni,t:lowercase" SecRule ARGS:download_file "@contains .." "t:none,t:urlDecodeUni" # DEFA-4626 SecRule REQUEST_METHOD "@rx GET|POST" "id:77318022,chain,msg:'IM360 WAF: Old style account creation and modification in Joomla!||MVN:%{MATCHED_VAR_NAME}||MV:%{MATCHED_VAR}||T:APACHE||',phase:2,pass,nolog,auditlog,t:none,severity:2,tag:'joomla_core'" SecRule ARGS:task "@rx register" "chain,t:none" SecRule REQUEST_FILENAME "@contains /component/users/" "t:none,t:normalizePath,t:lowercase" SecRule ARGS:option "@contains com_user" "id:77318023,chain,msg:'IM360 WAF: Old style account creation and modification in Joomla!||MVN:%{MATCHED_VAR_NAME}||MV:%{MATCHED_VAR}||T:APACHE||',phase:2,pass,nolog,auditlog,t:none,severity:2,tag:'joomla_core'" SecRule ARGS:view "@streq registration" "t:none" # Joomla Bruteforce RBL persistent storage check SecRule REQUEST_FILENAME "@endsWith administrator/index.php" "id:33347,chain,phase:2,t:none,block,severity:2,nolog,auditlog,msg:'IM360 WAF: Joomla Bruteforce RBL block||T:APACHE||MV:%{MATCHED_VAR}',tag:'service_i360'" SecRule REQUEST_METHOD "^POST$" "chain,t:none" SecRule ARGS:username "!@rx ^$" "chain,t:none" SecRule ARGS:passwd "!@rx ^$" "chain,t:none" SecRule ARGS:option "^com_login$" "chain,t:none" SecRule ARGS:task "^login$" "chain,t:none" SecRule IP:rbl_brute "@eq 1" # DEFA-1826, DEFA-2905 SecRule REQUEST_METHOD "@rx ^POST$" "id:77140875,chain,phase:2,block,log,severity:2,t:none,t:normalizePath,msg:'IM360 WAF: Joomla Com_Fabrik 3.9 controller File Upload Vulnerability||MVN:%{MATCHED_VAR_NAME}||MV:%{MATCHED_VAR}||T:APACHE||',tag:'service_im360'" SecRule REQUEST_FILENAME "@endsWith index.php" "chain,t:none,t:normalizePath" SecRule ARGS:option "@streq com_fabrik" "chain,t:none" SecRule ARGS:task "@streq plugin.pluginAjax" "chain,t:none" SecRule ARGS:plugin "@streq fileupload" "chain,t:none" SecRule FILES "@rx (?i)\.(?:h?php[\ds]?|pht[m]?|s?p?html?|swf|xap|phar|inc|ctp|pl|pgif|cgi|htaccess|module|exe|js|suspected|ico)(?:\W|$)" "t:none" # DEFA-1819 SecRule REQUEST_METHOD "@rx ^POST$" "id:77140904,chain,phase:2,block,log,severity:2,t:none,t:normalizePath,msg:'IM360 WAF: FCKEditor Core 2.x 2.4.3 File Upload Vulnerability||MVN:%{MATCHED_VAR_NAME}||MV:%{MATCHED_VAR}||T:APACHE||',tag:'service_im360'" SecRule REQUEST_FILENAME "@endsWith index.php" "chain,t:none,t:normalizePath" SecRule ARGS:option "@streq com_collector" "chain,t:none" SecRule ARGS:view "@streq filelist" "chain,t:none" SecRule ARGS:tmpl "@streq component" "chain,t:none" SecRule FILES "@rx (?i)\.(?:h?php[\ds]?|pht[m]?|s?p?html?|swf|xap|phar|inc|ctp|pl|pgif|cgi|htaccess|module|exe|js|suspected|ico)(?:\W|$)" "t:none" # DEFA-1819 SecRule ARGS:option "@streq com_b2jcontact" "id:77140905,chain,phase:2,block,log,severity:2,t:none,t:normalizePath,msg:'IM360 WAF: Joomla Codextrous B2jcontact 2.1.17 File Upload Vulnerability (CVE-2017-5214)||MVN:%{MATCHED_VAR_NAME}||MV:%{MATCHED_VAR}||T:APACHE||',tag:'service_i360custom',tag:'joomla_plugin'" SecRule ARGS:qqfile "@rx \.\.\/" "t:none" # DEFA-1785 SecRule REQUEST_METHOD "@rx ^GET$" "id:77140923,chain,phase:2,block,log,severity:2,t:none,t:normalizePath,msg:'IM360 WAF: Joomla Component Jreservation Blind SQLi Vulnerability||MVN:%{MATCHED_VAR_NAME}||T:APACHE||MV:%{MATCHED_VAR}||',tag:'service_im360'" SecRule REQUEST_FILENAME "@endsWith /index.php" "chain,t:none,t:normalizePath" SecRule ARGS:option "@streq com_content" "chain,t:none" SecRule ARGS:view "@streq article" "chain,t:none" SecRule ARGS:id|ARGS:limit_low "@rx [\)=*\/\|]" "t:none" # DEFA-1918 SecRule REQUEST_METHOD "@rx POST" "id:77140933,chain,phase:2,block,log,severity:2,t:none,msg:'IM360 WAF: Joomla JCE Arbitrary File Upload (file renaming)||MVN:%{MATCHED_VAR_NAME}||T:APACHE||MV:%{MATCHED_VAR}||',tag:'joomla_core'" SecRule ARGS:option "@streq com_jce" "chain,t:none,t:lowercase" SecRule ARGS:task "@streq plugin" "chain,t:none,t:lowercase" SecRule ARGS:plugin "@streq imgmanager" "chain,t:none,t:lowercase" SecRule ARGS:file "@streq imgmanager" "chain,t:none,t:lowercase" SecRule ARGS:json "@rx folderRename" "chain,t:none" SecRule ARGS:json "@rx \.htaccess|\.(pht|phtml|php\d?)" "t:lowercase" # DEFA-2203 file upload vulnerability in jwallpapers component for Dupal SecRule ARGS:option "@streq com_jwallpapers" "chain,id:77140999,phase:2,block,log,severity:2,t:none,msg:'IM360 WAF: File upload vulnerability in jwallpapers component for Drupal||MVN:%{MATCHED_VAR_NAME}||T:APACHE||MV:%{MATCHED_VAR}||SC:%{SCRIPT_FILENAME}||',tag:'service_im360'" SecRule ARGS:task "@streq upload" "chain,t:none" SecRule FILES "@rx (\.htaccess|\.(pht|phtml|php\d?)$)" "t:none,t:lowercase" # DEFA-2239 SecRule REQUEST_METHOD "@rx ^POST$" "chain,id:77141000,phase:2,block,log,severity:2,t:none,t:urlDecodeUni,msg:'IM360 WAF: File Upload Vulnerability in com_weblinks component dor Joomla!||MVN:%{MATCHED_VAR_NAME}||T:APACHE||MV:%{MATCHED_VAR}||SC:%{SCRIPT_FILENAME}||',tag:'service_im360'" SecRule ARGS:option "@streq com_media" "chain,t:none" SecRule ARGS:tmpl "@streq component" "chain,t:none" SecRule ARGS:view "@streq images" "chain,t:none" SecRule FILES "@rx (\.htaccess|\.(pht|phtml|php\d?)$)" "t:none,t:lowercase,t:urlDecodeUni,t:removeWhitespace,t:normalizePath" # DEFA-2240 SecRule REQUEST_METHOD "@rx ^POST$" "chain,id:77141001,phase:2,block,log,severity:2,t:none,t:urlDecodeUni,msg:'IM360 WAF: Path traversal vulnerability in com_foxcontact component for Joomla!||MVN:%{MATCHED_VAR_NAME}||T:APACHE||MV:%{MATCHED_VAR}||SC:%{SCRIPT_FILENAME}||',tag:'service_im360'" SecRule ARGS:option "@streq com_foxcontact" "chain,t:none" SecRule ARGS:view "@streq loader" "chain,t:none" SecRule ARGS:qqfile "@rx \.\.\/" "t:none,t:lowercase,t:urlDecodeUni,t:removeWhitespace,t:normalizePath" SecRule REQUEST_METHOD "@rx ^POST$" "id:77142115,chain,block,t:none,severity:2,msg:'IM360 WAF: SQLi in Joomla||T:APACHE||MVN:%{MATCHED_VAR_NAME}||MV:%{MATCHED_VAR}||',tag:'joomla_core'" SecRule ARGS:option "@streq com_users" "chain,t:none,t:urlDecodeUni" SecRule ARGS:task "@streq user.login" "chain,t:none,t:urlDecodeUni" SecRule ARGS:remember "@rx \W" "t:none,t:urlDecodeUni" SecRule REQUEST_METHOD "@rx ^POST$" "id:77142117,chain,block,log,t:none,severity:2,msg:'IM360 WAF: SQLi vulnerability in Joomla||T:APACHE||MVN:%{MATCHED_VAR_NAME}||MV:%{MATCHED_VAR}||',tag:'joomla_core'" SecRule ARGS:option "@streq com_users" "chain,t:none,t:urlDecodeUni" SecRule ARGS:task "@streq user.login" "chain,t:none,t:urlDecodeUni" SecRule ARGS:username "@rx [\x22\:\\\]]" "t:none,t:urlDecodeUni" # DEFA-2704 SecRule REQUEST_METHOD "@rx ^POST$" "id:77142122,chain,phase:2,block,log,severity:2,t:none,msg:'IM360 WAF: SQLi in com_content component for Joomla!||MVN:%{MATCHED_VAR_NAME}||T:APACHE||MV:%{MATCHED_VAR}||',tag:'joomla_core'" SecRule REQUEST_FILENAME "@endsWith /index.php" "chain,t:none,t:urlDecodeUni,t:normalizePath" SecRule ARGS:option "@streq com_content" "chain,t:none,t:urlDecodeUni" SecRule ARGS:task "@streq view" "chain,t:none,t:urlDecodeUni" SecRule ARGS:id|ARGS:Itemid "@rx \D" "t:none,t:urlDecodeUni" # DEFA-2704 SecRule REQUEST_METHOD "@rx ^POST$" "id:77142123,chain,phase:2,block,log,severity:2,t:none,msg:'IM360 WAF: SQLi in com_content component for Joomla!||MVN:%{MATCHED_VAR_NAME}||T:APACHE||MV:%{MATCHED_VAR}||',tag:'joomla_core'" SecRule REQUEST_FILENAME "@endsWith /index.php" "chain,t:none,t:urlDecodeUni,t:normalizePath" SecRule ARGS:task "@streq view" "chain,t:none,t:urlDecodeUni" SecRule ARGS:option "@rx \W" "t:none,t:urlDecodeUni" # No DEFA SecRule &ARGS:title "@gt 0" "id:77142127,chain,block,severity:2,t:none,msg:'IM360 WAF: XSS vulnerability in com_easydiscuss plugin for Joomla||T:APACHE||MVN:%{MATCHED_VAR_NAME}||MV:%{MATCHED_VAR}||',tag:'joomla_plugin'" SecRule &ARGS:dc_content "@gt 0" "chain,t:none" SecRule &ARGS:poster_email "@gt 0" "chain,t:none" SecRule ARGS:option "@streq com_easydiscuss" "chain,t:none" SecRule ARGS:tags[] "@rx [\x22><']" "t:none,t:utf8toUnicode,t:urlDecodeUni,t:htmlEntityDecode,t:jsDecode,t:cssDecode,t:removeNulls" # DEFA-2746 SecRule REQUEST_METHOD "@rx ^POST$" "id:77142149,chain,phase:2,block,log,severity:2,t:none,msg:'IM360 WAF: Joomla JCE Editor path traversal Vulnerability||MVN:%{MATCHED_VAR_NAME}||T:APACHE||MV:%{MATCHED_VAR}||',tag:'joomla_core'" SecRule ARGS:option "@streq com_jce" "chain,t:none,t:urlDecodeUni" SecRule ARGS:plugin|ARGS:file "@streq imgmanager" "chain,t:none,t:urlDecodeUni" SecRule ARGS:upload-dir "@rx \.\.\/" "t:urlDecodeUni,t:removeWhitespace,t:normalizePath" # DEFA-2907 SecRule REQUEST_FILENAME "@endsWith /index.php" "chain,id:77142214,block,log,severity:2,t:none,t:normalizePath,msg:'IM360 WAF: SQLi in JM Car Classifieds CarAgent Templates Joomla Plugin||MVN:%{MATCHED_VAR_NAME}||T:APACHE||MV:%{MATCHED_VAR}||',tag:'joomla_plugin'" SecRule ARGS:option "@streq com_djclassifieds" "chain,t:none" SecRule ARGS:view "@pm item show showitem" "chain,t:none,t:lowercase" SecRule ARGS:id|ARGS:Itemid|ARGS:type|ARGS:layout|ARGS:cid|ARGS:uid|ARGS:se "@rx [\x22\']" "t:none,t:urlDecode" SecRule REQUEST_METHOD "@pm GET POST" "id:77223010,chain,msg:'IM360 WAF: XSS vulnerability in Joomla! before 3.8.12 (CVE-2018-15880)||MVN:%{MATCHED_VAR_NAME}||MV:%{MATCHED_VAR}||T:APACHE||',phase:2,block,log,t:none,severity:2,tag:'joomla_core'" SecRule ARGS:option "@streq com_users" "chain,t:none,t:urlDecodeUni,t:lowercase" SecRule ARGS:jform[name] "@contains <" "t:none,t:urlDecodeUni" SecRule REQUEST_METHOD "@pm GET POST" "id:77223300,chain,msg:'IM360 WAF: Directory Traversal vulnerability in Joomla before 3.9.5 (CVE-2019-10945)||MVN:%{MATCHED_VAR_NAME}||MV:%{MATCHED_VAR}||T:APACHE||',phase:2,block,log,t:none,severity:2,tag:'joomla_core'" SecRule ARGS:option "@streq com_media" "chain,t:none,t:urlDecodeUni,t:lowercase" SecRule ARGS:folder "@contains .." "t:none,t:urlDecodeUni" SecMarker Joomla_Skip_URF_223010 SecRule ARGS:option "@streq com_fields" "id:77222550,chain,msg:'IM360 WAF: SQL injection vulnerability in Joomla! 3.7.x before 3.7.1 (CVE-2017-8917)||MVN:%{MATCHED_VAR_NAME}||MV:%{MATCHED_VAR}||T:APACHE||',phase:2,block,log,t:none,t:lowercase,severity:2,tag:'joomla_core'" SecRule ARGS:view "@streq fields" "chain,t:none,t:lowercase" SecRule REQUEST_FILENAME "!@contains /administrator/" "chain,t:none,t:urlDecodeUni,t:normalizePath,t:lowercase" SecRule REQUEST_BASENAME "@within index.php" "chain,t:none,t:lowercase" SecRule ARGS:list[fullordering] "@rx [^\w\ \.]" "t:none,t:urlDecodeUni" SecRule REQUEST_METHOD "@pm GET POST" "id:77222990,chain,msg:'IM360 WAF: SQL injection vulnerability in Google Map Landkarten 4.2.3 component for Joomla (CVE-2018-6396)||MVN:%{MATCHED_VAR_NAME}||MV:%{MATCHED_VAR}||T:APACHE||',phase:2,block,log,t:none,severity:2,tag:'joomla_plugin'" SecRule ARGS:option "@streq com_gmap" "chain,t:none,t:urlDecodeUni,t:lowercase" SecRule ARGS:cid|ARGS:id|ARGS:map "@contains '" "t:none,t:urlDecodeUni" SecRule REQUEST_METHOD "@pm GET POST" "id:77222630,chain,msg:'IM360 WAF: SQL injection vulnerability in the SimpleCalendar 3.1.9 component for Joomla! (CVE-2018-5974)||MVN:%{MATCHED_VAR_NAME}||MV:%{MATCHED_VAR}||T:APACHE||',phase:2,block,log,t:none,severity:2,tag:'joomla_plugin'" SecRule ARGS:option "@streq com_simplecalendar" "chain,t:none,t:urlDecodeUni,t:lowercase" SecRule ARGS:view "@streq events" "chain,t:none,t:lowercase" SecRule ARGS:/catid\[\d+\]/ "@rx \D" "t:none" SecRule REQUEST_METHOD "@pm GET POST" "id:77222690,chain,msg:'IM360 WAF: SQL injection vulnerability in JEXTN Classified 1.0.0 component and JEXTN Reverse Auction 3.1.0 component for Joomla (CVE-2018-6575 and CVE-2018-6579)||MVN:%{MATCHED_VAR_NAME}||MV:%{MATCHED_VAR}||T:APACHE||',phase:2,block,log,t:none,severity:2,tag:'joomla_plugin'" SecRule ARGS:option "@within com_jereverseauction com_jeclassifieds" "chain,t:none,t:urlDecodeUni,t:lowercase" SecRule ARGS:id "@rx \D" "t:none" # DEFA-3987 SecMarker MARKER_option SecRule REQUEST_URI "@rx \/api\/index.php\/v1\/(?:config\/application|users)" "id:77350169,chain,phase:2,block,log,severity:2,t:none,t:normalizePath,msg:'IM360 WAF: Improper access check in webservice endpoints in Joomla! (CVE-2023-23752)||MV:%{MATCHED_VAR}||T:APACHE||',tag:'joomla_core'" SecRule ARGS:public "!@rx ^$" "t:none"
Simpan