general mod_security related issues...

I'm running vbulletin and a couple other scripts and using the following mod_security ruleset:

Code:
<IfModule mod_security.c>
SecFilterEngine On
#SecFilterSelective REMOTE_ADDR ^MYIP$ nolog,allow
# below I was watching the logs as I triggered things, but allowed anyway...
#SecFilterSelective REMOTE_ADDR ^MYIP$ allow      
SecFilterCheckURLEncoding On
SecFilterForceByteRange 0 255
SecAuditEngine RelevantOnly
SecAuditLog /usr/home/WEBLOGS/modsec_audit_log
SecFilterDebugLog /usr/home/WEBLOGS/modsec_debug_log
SecFilterDebugLevel 0
SecFilterScanPOST On
SecFilterDefaultAction "deny,log,status:406"
SecFilter /bup/
SecFilter /boot
SecFilter /dev
SecFilter /etc
SecFilter /initrd
SecFilter /lib
SecFilter /lost+found
#SecFilter /misc
SecFilter /mnt
SecFilter /proc
SecFilter /root
SecFilter /sbin
SecFilter /scripts
SecFilter /tmp
SecFilter /usr/local/apache
SecFilter /usr/local/cpanel
SecFilter /usr/local/mysql
SecFilter /var
SecFilter /boot/
SecFilter /dev/
SecFilter /etc/
SecFilter /initrd/
SecFilter /lib/
SecFilter /lost+found/
#SecFilter /misc/
SecFilter /mnt/
SecFilter /proc/
SecFilter /root/
SecFilter /sbin/
SecFilter /scripts/
SecFilter /tmp/
SecFilter /usr/local/apache/
SecFilter /usr/local/cpanel/
SecFilter /usr/local/mysql/
SecFilter /var/
SecFilter /bin/cc
SecFilter /bin/gcc
SecFilter "<[[pace:]]*script"
#SecFilter "<(.|\n)+>"
SecFilter "delete[[pace:]]+from"
SecFilter "insert[[pace:]]+into"
SecFilter "select.+from"
SecFilterSelective "HTTP_USER_AGENT|HTTP_HOST" "^$"
</IfModule>




Upon posting a message it triggered the following:
Code:
Access denied with code 406. Pattern match "<(.|\\n)+>" at POST_PAYLOAD

What kind of attacks would you be subject to with that uncommented?


What about with /misc and /misc/ uncommented?

 

 

 

 

Top