Aedating v3 3

posted by | Leave a comment

" chain Sec Rule REQUEST_LINE "((name|pm_path|pagina|path|include_location|root|page|open)=(http|https|ftp)|(cmd|command|inc)=)" Sec Rule REQUEST_LINE "\.(dat|gif|jpg|png|bmp|txt|vir|dot)\? &cmd=" #PHPFan Base - Sec Rule REQUEST_URI ".*protection\.php" chain Sec Rule QUERY_STRING ".*action=logout\&siteurl= #php BB - #Sec Rule REQUEST_URI ".*viewtopic\*" chain #Sec Rule QUERY_STRING ".*highlight=.*? name=downloads\&d(_|\s|.|\[)op=viewsdownload\&sid=-1" #Php Nuke SQL Injection Attempt - ( \&(cmd|command|inc|name)=" Sec Rule ARGS "\.(dat|gif|jpg|png|bmp|txt|vir|dot)" chain Sec Rule REQUEST_LINE "\? modname=sa&id=35) Sec Rule REQUEST_URI ".*modules\.php\? " chain Sec Rule QUERY_STRING ".*name=search.*" chain Sec Rule QUERY_STRING ".*instory=.*" #Php Nuke SQL Injection Attempt - ( modname=sa&id=36) Sec Rule REQUEST_URI ".*modules\.php\? " chain Sec Rule QUERY_STRING ".*name=.*" chain Sec Rule QUERY_STRING ".*union.*" chain Sec Rule QUERY_STRING ".*select.*" #Damn MAMBO! cmd=" #new pattern Sec Rule REQUEST_URI "btn_lists\.gif\? " #remote file inclusion generic attack signature Sec Rule REQUEST_LINE "\.(dat|gif|jpg|png|bmp|txt|vir|dot)\? (\'|\%[a-f0-9])" #Php Nuke Exploit - Sec Rule REQUEST_URI ".*modules\.php\? " chain Sec Rule REQUEST_LINE "((name|pm_path|pagina|path|include_location|root|page|open)=(http|https|ftp)|(cmd|command|inc)=)" Sec Rule REQUEST_LINE "\.(dat|gif|jpg|png|bmp|txt|vir|dot)\? &cmd=" #PHPFan Base - Sec Rule REQUEST_URI ".*protection\.php" chain Sec Rule QUERY_STRING ".*action=logout\&siteurl= #php BB - #Sec Rule REQUEST_URI ".*viewtopic\*" chain #Sec Rule QUERY_STRING ".*highlight=.*? name=downloads\&d(_|\s|.|\[)op=viewsdownload\&sid=-1" #Php Nuke SQL Injection Attempt - ( &" #new kit Sec Rule REQUEST_LINE "/c99shell\.txt" #remote bash shell Sec Rule REQUEST_URI "/shell\.php\&cmd=" Sec Rule ARGS "/shell\.php\&cmd=" #zencart exploit Sec Rule REQUEST_URI "/ipn\.php\? cmd=" #new pattern Sec Rule REQUEST_URI "btn_lists\.gif\? " #remote file inclusion generic attack signature Sec Rule REQUEST_LINE "\.(dat|gif|jpg|png|bmp|txt|vir|dot)\? (\'|\%[a-f0-9])" #Php Nuke Exploit - Sec Rule REQUEST_URI ".*modules\.php\? &" #new kit Sec Rule REQUEST_LINE "/c99shell\.txt" #remote bash shell Sec Rule REQUEST_URI "/shell\.php\&cmd=" Sec Rule ARGS "/shell\.php\&cmd=" #zencart exploit Sec Rule REQUEST_URI "/ipn\.php\?" Sec Rule REQUEST_LINE "/terminatorx-exp.*\.(gif|jpg|txt|bmp|php)\? " Sec Rule REQUEST_LINE "/\.it/viewde" Sec Rule REQUEST_LINE "/cmd\? &(cmd|command)=" Sec Rule REQUEST_LINE "/pro18\.(gif|jpg|txt|bmp)\? " Sec Rule REQUEST_LINE "/shell\.(gif|jpg|txt|bmp)\? " Sec Rule REQUEST_LINE "/bash\.(gif|jpg|txt|bmp)\? " Sec Rule REQUEST_LINE "/(o|0|p)wn(e|3)d\.(gif|jpg|txt|bmp)\? &(cmd|command)=" Sec Rule REQUEST_LINE "/get\.(gif|jpg|txt|bmp)\? " Sec Rule REQUEST_LINE "/root\.(gif|jpg|txt|bmp)\? &(command|cmd)=" Sec Rule REQUEST_LINE "/cmd\.php\.ns\? &(command|cmd)=" Sec Rule REQUEST_LINE "/cmd\.php\? &(command|cmd)=" Sec Rule REQUEST_LINE "/cmd\.dat\? &(command|cmd)=" Sec Rule REQUEST_LINE "/sep\.txt\? &(command|cmd)=" Sec Rule REQUEST_LINE "/cmd\.php\.ns\? &(command|cmd)=" Sec Rule REQUEST_LINE "/cmd\.php\? &(command|cmd)=" Sec Rule REQUEST_LINE "/cmd\.dat\? &(command|cmd)=" Sec Rule REQUEST_LINE "/sep\.txt\? ^$" #deny TRACE method Sec Rule REQUEST_METHOD "trace" #Don't accept chunked encodings #modsecurity can not look at these, so this is a hole #that can bypass your rules, the rule before this one #should cover this, but hey paranoia is cheap Sec Rule HTTP_Transfer-Encoding "chunked" # Custome Rules start here #generic recursion signature #Sec Rule REQUEST_LINE "\.\./\.\./" # WEB-ATTACKS uname -a command attempt Sec Rule REQUEST_LINE "uname" chain Sec Rule REQUEST_LINE "\x20-a" # WEB-ATTACKS /bin/ps command attempt Sec Rule REQUEST_LINE "/bin/ps" # WEB-ATTACKS /usr/bin/id command attempt Sec Rule REQUEST_LINE "/usr/bin/id" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS echo command attempt Sec Rule REQUEST_LINE "/bin/echo" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS kill command attempt Sec Rule REQUEST_LINE "/bin/kill" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS chmod command attempt Sec Rule REQUEST_LINE "/bin/chmod" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS chsh command attempt Sec Rule REQUEST_LINE "/usr/bin/chsh" # WEB-ATTACKS gcc command attempt Sec Rule REQUEST_LINE "gcc" chain Sec Rule REQUEST_LINE "x20-o" # WEB-ATTACKS /usr/bin/cc command attempt Sec Rule REQUEST_LINE "/usr/bin/cc" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS /usr/bin/cpp command attempt Sec Rule REQUEST_LINE "/usr/bin/cpp" chain # WEB-ATTACKS /usr/bin/g command attempt Sec Rule REQUEST_LINE "/usr/bin/g\ \ " chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS g command attempt Sec Rule REQUEST_LINE "g\ \ \x20" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS bin/python access attempt Sec Rule REQUEST_LINE "bin/python" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS python access attempt #Sec Rule REQUEST_LINE "python\x20" # WEB-ATTACKS bin/tclsh execution attempt Sec Rule REQUEST_LINE "bin/tclsh" # WEB-ATTACKS tclsh execution attempt Sec Rule REQUEST_LINE "tclsh8\x20" # WEB-ATTACKS bin/nasm command attempt Sec Rule REQUEST_LINE "bin/nasm" # WEB-ATTACKS nasm command attempt Sec Rule REQUEST_LINE "nasm\x20" # WEB-ATTACKS /usr/bin/perl execution attempt Sec Rule REQUEST_LINE "/usr/bin/perl" # WEB-ATTACKS traceroute command attempt Sec Rule REQUEST_LINE "traceroute" chain Sec Rule REQUEST_LINE "\x20([0-9]\.[0-9]\.[0-9]\.[0-9]|[0-9] \.[0-9] \.[0-9] \.[0-9] )" # WEB-ATTACKS ping command attempt Sec Rule REQUEST_LINE "/bin/ping" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS mail command attempt Sec Rule REQUEST_LINE "/bin/mail" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS /bin/ls command attempt Sec Rule REQUEST_LINE "/bin/ls" chain Sec Rule REQUEST_LINE "\x20" # WEB-MISC /etc/passwd access Sec Rule REQUEST_URI "/etc/passwd" # WEB-MISC ls -l Sec Rule REQUEST_LINE "ls" chain Sec Rule REQUEST_LINE "\x20-l" # cd /tmp , /var/tmp , /dev/shm Sec Rule REQUEST_LINE "cd\x20/(tmp|var/tmp|dev/shm)" # WEB-MISC perl /tmp/*etc.. " Sec Rule REQUEST_LINE "/lila\.(gif|jpg|txt|bmp)\? #Sec Rule REQUEST_LINE "perl" chain #Sec Rule REQUEST_LINE "\x20[a-za-z0-9/]" # WEB-MISC /~root access Sec Rule REQUEST_URI "/~root" # WEB-MISC /~ftp access Sec Rule REQUEST_URI "/~ftp" # WEB-MISC /~nobody access Sec Rule REQUEST_URI "/~nobody" # WEB-MISC Apache Chunked-Encoding worm attempt Sec Rule REQUEST_LINE "ccccccc\: aaaaaaaaaaaaaaaaaaa" # Web-attacks chdir Sec Rule REQUEST_URI "&(cmd|command)=chdir\x20" # Download Sec Rule REQUEST_LINE "wget\x20" Sec Rule REQUEST_LINE "curl\x20" Sec Rule REQUEST_LINE "lynx\x20" Sec Rule REQUEST_LINE "lwp-download\x20" # Bcc Spamming Sec Rule REQUEST_BODY "\s*(b|b)cc\:" #Email Injection Sec Rule ARGS "\n:space:*:.*@" #################################### # FRONTPAGE #################################### Sec Rule REQUEST_LINE "_vti_bin" allow Sec Rule REQUEST_LINE "/fpsrvadm\.exe" pass Sec Rule REQUEST_LINE "/fpremadm\.exe" pass Sec Rule REQUEST_LINE "/admisapi/fpadmin\.htm" pass Sec Rule REQUEST_LINE "/scripts/fpadmcgi\.exe" pass Sec Rule REQUEST_LINE "/_private/orders\.txt" pass Sec Rule REQUEST_LINE "/_private/form_results\.txt" pass Sec Rule REQUEST_LINE "/_private/registrations\.htm" pass Sec Rule REQUEST_LINE "/cfgwiz\.exe" pass Sec Rule REQUEST_LINE "/authors\.pwd" pass Sec Rule REQUEST_LINE "/_vti_bin/_vti_aut/author\.exe" pass Sec Rule REQUEST_LINE "/administrators\.pwd" pass Sec Rule REQUEST_LINE "/_private/form_results\.htm" pass Sec Rule REQUEST_LINE "/_vti_pvt/access\.cnf" pass Sec Rule REQUEST_LINE "/_private/register\.txt" pass Sec Rule REQUEST_LINE "/_private/registrations\.txt" pass Sec Rule REQUEST_LINE "/_vti_pvt/service\.cnf" pass Sec Rule REQUEST_LINE "/service\.pwd" pass Sec Rule REQUEST_LINE "/_vti_pvt/service\.stp" pass Sec Rule REQUEST_LINE "/_vti_pvt/services\.cnf" pass Sec Rule REQUEST_LINE "/_vti_bin/shtml\.exe" pass Sec Rule REQUEST_LINE "/_vti_pvt/svcacl\.cnf" pass Sec Rule REQUEST_LINE "/users\.pwd" pass Sec Rule REQUEST_LINE "/_vti_pvt/writeto\.cnf" pass Sec Rule REQUEST_LINE "/dvwssr\.dll" pass Sec Rule REQUEST_LINE "/_private/register\.htm" pass Sec Rule REQUEST_LINE "/_vti_bin/" pass ########################################### #Double pipe exclusion rules ########################################### Sec Rule REQUEST_LINE "/cse\.(gif|jpg|txt|bmp)\? " Sec Rule REQUEST_LINE "/nmap\.(gif|jpg|txt|bmp)\?

||

" chain Sec Rule REQUEST_LINE "((name|pm_path|pagina|path|include_location|root|page|open)=(http|https|ftp)|(cmd|command|inc)=)" Sec Rule REQUEST_LINE "\.(dat|gif|jpg|png|bmp|txt|vir|dot)\? &cmd=" #PHPFan Base - Sec Rule REQUEST_URI ".*protection\.php" chain Sec Rule QUERY_STRING ".*action=logout\&siteurl= #php BB - #Sec Rule REQUEST_URI ".*viewtopic\*" chain #Sec Rule QUERY_STRING ".*highlight=.*? name=downloads\&d(_|\s|.|\[)op=viewsdownload\&sid=-1" #Php Nuke SQL Injection Attempt - ( \&(cmd|command|inc|name)=" Sec Rule ARGS "\.(dat|gif|jpg|png|bmp|txt|vir|dot)" chain Sec Rule REQUEST_LINE "\? modname=sa&id=35) Sec Rule REQUEST_URI ".*modules\.php\? " chain Sec Rule QUERY_STRING ".*name=search.*" chain Sec Rule QUERY_STRING ".*instory=.*" #Php Nuke SQL Injection Attempt - ( modname=sa&id=36) Sec Rule REQUEST_URI ".*modules\.php\? " chain Sec Rule QUERY_STRING ".*name=.*" chain Sec Rule QUERY_STRING ".*union.*" chain Sec Rule QUERY_STRING ".*select.*" #Damn MAMBO!

cmd=" #new pattern Sec Rule REQUEST_URI "btn_lists\.gif\? " #remote file inclusion generic attack signature Sec Rule REQUEST_LINE "\.(dat|gif|jpg|png|bmp|txt|vir|dot)\? (\'|\%[a-f0-9])" #Php Nuke Exploit - Sec Rule REQUEST_URI ".*modules\.php\? " chain Sec Rule REQUEST_LINE "((name|pm_path|pagina|path|include_location|root|page|open)=(http|https|ftp)|(cmd|command|inc)=)" Sec Rule REQUEST_LINE "\.(dat|gif|jpg|png|bmp|txt|vir|dot)\? &cmd=" #PHPFan Base - Sec Rule REQUEST_URI ".*protection\.php" chain Sec Rule QUERY_STRING ".*action=logout\&siteurl= #php BB - #Sec Rule REQUEST_URI ".*viewtopic\*" chain #Sec Rule QUERY_STRING ".*highlight=.*? name=downloads\&d(_|\s|.|\[)op=viewsdownload\&sid=-1" #Php Nuke SQL Injection Attempt - (

&" #new kit Sec Rule REQUEST_LINE "/c99shell\.txt" #remote bash shell Sec Rule REQUEST_URI "/shell\.php\&cmd=" Sec Rule ARGS "/shell\.php\&cmd=" #zencart exploit Sec Rule REQUEST_URI "/ipn\.php\? cmd=" #new pattern Sec Rule REQUEST_URI "btn_lists\.gif\? " #remote file inclusion generic attack signature Sec Rule REQUEST_LINE "\.(dat|gif|jpg|png|bmp|txt|vir|dot)\? (\'|\%[a-f0-9])" #Php Nuke Exploit - Sec Rule REQUEST_URI ".*modules\.php\?

&" #new kit Sec Rule REQUEST_LINE "/c99shell\.txt" #remote bash shell Sec Rule REQUEST_URI "/shell\.php\&cmd=" Sec Rule ARGS "/shell\.php\&cmd=" #zencart exploit Sec Rule REQUEST_URI "/ipn\.php\?

]]

^(GET|HEAD|OPTIONS)$" chain #Sec Rule HTTP_Content-Type "! (^application/x-www-form-urlencoded$|^multipart/form-data;).*" "deny,log,status:406" #Added a rule_id so that this rule can be disabled. ^(get|head|options|post|put|propfind)$" chain,deny,log,id:90001,status:406 Sec Rule HTTP_Content-Type "! (^application/x-www-form-urlencoded|^multipart/form-data;).*$" Include "/usr/local/apache/conf/pcre_modsecurity_exceeded_limits.conf" # Do not accept GET or HEAD requests with bodies Sec Rule REQUEST_METHOD "^(get|head)$" chain,deny,log,status:406 Sec Rule HTTP_Content-Length "! frontpage" # Require Content-Length to be provided with # every POST request Sec Rule REQUEST_METHOD "^post$" chain Sec Rule HTTP_Content-Length "^$" # Don't accept transfer encodings we know we don't handle Sec Rule HTTP_Transfer-Encoding "! " Sec Rule REQUEST_LINE "/new(cmd|command)\.(gif|jpg|txt|bmp)\? " Sec Rule REQUEST_LINE "/(cmd|command)\.(gif|jpg|txt|bmp)\? " Sec Rule REQUEST_LINE "/(cmd|command)[0-9]\.(gif|jpg|txt|bmp)\? " Sec Rule REQUEST_LINE "/[a-z](cmd|command)\.(gif|jpg|txt|bmp)\? " Sec Rule REQUEST_LINE "/[a-z](cmd|command)[0-9]\.(gif|jpg|txt|bmp)\? " Sec Rule REQUEST_LINE "/ijoo\.(gif|jpg|txt|bmp)\? " Sec Rule REQUEST_LINE "/oinc\.(gif|jpg|txt|bmp)\? ^$" #deny TRACE method Sec Rule REQUEST_METHOD "trace" #Don't accept chunked encodings #modsecurity can not look at these, so this is a hole #that can bypass your rules, the rule before this one #should cover this, but hey paranoia is cheap Sec Rule HTTP_Transfer-Encoding "chunked" # Custome Rules start here #generic recursion signature #Sec Rule REQUEST_LINE "\.\./\.\./" # WEB-ATTACKS uname -a command attempt Sec Rule REQUEST_LINE "uname" chain Sec Rule REQUEST_LINE "\x20-a" # WEB-ATTACKS /bin/ps command attempt Sec Rule REQUEST_LINE "/bin/ps" # WEB-ATTACKS /usr/bin/id command attempt Sec Rule REQUEST_LINE "/usr/bin/id" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS echo command attempt Sec Rule REQUEST_LINE "/bin/echo" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS kill command attempt Sec Rule REQUEST_LINE "/bin/kill" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS chmod command attempt Sec Rule REQUEST_LINE "/bin/chmod" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS chsh command attempt Sec Rule REQUEST_LINE "/usr/bin/chsh" # WEB-ATTACKS gcc command attempt Sec Rule REQUEST_LINE "gcc" chain Sec Rule REQUEST_LINE "x20-o" # WEB-ATTACKS /usr/bin/cc command attempt Sec Rule REQUEST_LINE "/usr/bin/cc" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS /usr/bin/cpp command attempt Sec Rule REQUEST_LINE "/usr/bin/cpp" chain # WEB-ATTACKS /usr/bin/g command attempt Sec Rule REQUEST_LINE "/usr/bin/g\ \ " chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS g command attempt Sec Rule REQUEST_LINE "g\ \ \x20" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS bin/python access attempt Sec Rule REQUEST_LINE "bin/python" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS python access attempt #Sec Rule REQUEST_LINE "python\x20" # WEB-ATTACKS bin/tclsh execution attempt Sec Rule REQUEST_LINE "bin/tclsh" # WEB-ATTACKS tclsh execution attempt Sec Rule REQUEST_LINE "tclsh8\x20" # WEB-ATTACKS bin/nasm command attempt Sec Rule REQUEST_LINE "bin/nasm" # WEB-ATTACKS nasm command attempt Sec Rule REQUEST_LINE "nasm\x20" # WEB-ATTACKS /usr/bin/perl execution attempt Sec Rule REQUEST_LINE "/usr/bin/perl" # WEB-ATTACKS traceroute command attempt Sec Rule REQUEST_LINE "traceroute" chain Sec Rule REQUEST_LINE "\x20([0-9]\.[0-9]\.[0-9]\.[0-9]|[0-9] \.[0-9] \.[0-9] \.[0-9] )" # WEB-ATTACKS ping command attempt Sec Rule REQUEST_LINE "/bin/ping" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS mail command attempt Sec Rule REQUEST_LINE "/bin/mail" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS /bin/ls command attempt Sec Rule REQUEST_LINE "/bin/ls" chain Sec Rule REQUEST_LINE "\x20" # WEB-MISC /etc/passwd access Sec Rule REQUEST_URI "/etc/passwd" # WEB-MISC ls -l Sec Rule REQUEST_LINE "ls" chain Sec Rule REQUEST_LINE "\x20-l" # cd /tmp , /var/tmp , /dev/shm Sec Rule REQUEST_LINE "cd\x20/(tmp|var/tmp|dev/shm)" # WEB-MISC perl /tmp/*etc.. " Sec Rule REQUEST_LINE "/lila\.(gif|jpg|txt|bmp)\?

.*" chain Sec Rule QUERY_STRING ".*option=com(_|\s|.|\[)na(_|\s|.|\[)newsdescription.*" chain Sec Rule QUERY_STRING ".*(union|select|from|where|drop|create|table).*" #Joomla com_simple_review ( ) - Sec Rule REQUEST_URI ".*index\.php\? .*" chain Sec Rule QUERY_STRING ".*option=com(_|\s|.|\[)simple(_|\s|.|\[)review.*" chain Sec Rule QUERY_STRING ".*(union|select|from|where|drop|create|table).*" #Coppermine Privilege Escalation ( ) - Sec Rule REQUEST_URI ".*delete\.php\?

.*" chain Sec Rule QUERY_STRING ".*option=com(_|\s|.|\[)phocadocumentation.*" chain Sec Rule QUERY_STRING ".*(union|select|from|where|drop|create|table).*" #Joomla com_na_newsdescription ( ) - Sec Rule REQUEST_URI ".*index\.php\? .*" chain Sec Rule QUERY_STRING ".*option=com(_|\s|.|\[)na(_|\s|.|\[)newsdescription.*" chain Sec Rule QUERY_STRING ".*(union|select|from|where|drop|create|table).*" #Joomla com_simple_review ( ) - Sec Rule REQUEST_URI ".*index\.php\?

pathnews= # News Evolution v3.0.3 - Remote File Include Vulnerabilities - ( Sec Rule REQUEST_URI ".*\/(install|migratene2tone3)\.php\? .*" chain Sec Rule QUERY_STRING ".*cutepath= #Coppermine Injection Attack File - Sec Rule REQUEST_URI "45563131x.jpg" #Joomla Password Reset Vulnerability ( ) - Sec Rule REQUEST_URI ".*index\.php\? (_|\s|.|\[)ne\[abspath\]= # PHPLink Exchange remote file include - ( Sec Rule REQUEST_URI ".*bits_listings\.php\? - ( Sec Rule REQUEST_URI ".*\/inc\/cmses\/aedating(4)? .*" chain Sec Rule QUERY_STRING ".*option=com_user&task=confirmreset.*" chain Sec Rule REQUEST_BODY "!

include= #ACGV News v0.9.1 - Remote File Include Vulnerabilities - ( Sec Rule REQUEST_URI ".*acgvnews\/header\.php\? dir\[inc\]= #My Speach #Cutenews cutepath ( - Sec Rule REQUEST_URI ".*show(_|\s|.|\[)(archives|news)\.php\? pathnews= # News Evolution v3.0.3 - Remote File Include Vulnerabilities - ( Sec Rule REQUEST_URI ".*\/(install|migratene2tone3)\.php\? .*" chain Sec Rule QUERY_STRING ".*cutepath= #Coppermine Injection Attack File - Sec Rule REQUEST_URI "45563131x.jpg" #Joomla Password Reset Vulnerability ( ) - Sec Rule REQUEST_URI ".*index\.php\?

Leave a Reply

dating giving up