Skip to content
This repository was archived by the owner on May 14, 2020. It is now read-only.

Commit 64f5d9b

Browse files
committed
Fix broken links in references
1 parent 4304b9e commit 64f5d9b

File tree

4 files changed

+14
-15
lines changed

4 files changed

+14
-15
lines changed

rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@
1313
#
1414
# The purpose of this rules file is to enforce HTTP RFC requirements that state how
1515
# the client is supposed to interact with the server.
16-
# http://www.w3.org/Protocols/rfc2616/rfc2616-sec3.html
16+
# https://www.w3.org/Protocols/rfc2616/rfc2616-sec3.html
1717

1818

1919

@@ -41,7 +41,7 @@ SecRule TX:PARANOIA_LEVEL "@lt 1" "phase:2,id:920012,nolog,pass,skipAfter:END-RE
4141
# It also outlines proper construction for CONNECT, OPTIONS and GET requests.
4242
#
4343
# -=[ References ]=-
44-
# http://www.w3.org/Protocols/rfc2616/rfc2616-sec3.html#sec3.2.1
44+
# https://www.w3.org/Protocols/rfc2616/rfc2616-sec3.html#sec3.2.1
4545
# http://capec.mitre.org/data/definitions/272.html
4646
#
4747
SecRule REQUEST_LINE "!@rx ^(?i:(?:[a-z]{3,10}\s+(?:\w{3,7}?://[\w\-\./]*(?::\d+)?)?/[^?#]*(?:\?[^#\s]*)?(?:#[\S]*)?|connect (?:\d{1,3}\.){3}\d{1,3}\.?(?::\d+)?|options \*)\s+[\w\./]+|get /[^?#]*(?:\?[^#\s]*)?(?:#[\S]*)?)$" \
@@ -128,7 +128,7 @@ SecRule FILES_NAMES|FILES "@rx (?<!&(?:[aAoOuUyY]uml)|&(?:[aAeEiIoOuU]circ)|&(?:
128128
# by the request body processor if it encounters errors.
129129
#
130130
# -=[ References ]=-
131-
# https://sourceforge.net/apps/mediawiki/mod-security/index.php?title=Reference_Manual#REQBODY_ERROR
131+
# https://sourceforge.net/projects/mod-security/
132132
#
133133
SecRule REQBODY_ERROR "!@eq 0" \
134134
"id:920130,\
@@ -161,7 +161,7 @@ SecRule REQBODY_ERROR "!@eq 0" \
161161
# _not_ to remove it altogether.
162162
#
163163
# -=[ References ]=-
164-
# https://sourceforge.net/apps/mediawiki/mod-security/index.php?title=Reference_Manual#MULTIPART_STRICT_ERROR
164+
# https://sourceforge.net/projects/mod-security/
165165
#
166166
SecRule MULTIPART_STRICT_ERROR "!@eq 0" \
167167
"id:920140,\
@@ -202,7 +202,7 @@ SecRule MULTIPART_STRICT_ERROR "!@eq 0" \
202202
# is NOT all digits, then it will match.
203203
#
204204
# -=[ References ]=-
205-
# http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html#sec14.13
205+
# https://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html#sec14.13
206206
#
207207
SecRule REQUEST_HEADERS:Content-Length "!@rx ^\d+$" \
208208
"id:920160,\
@@ -238,7 +238,7 @@ SecRule REQUEST_HEADERS:Content-Length "!@rx ^\d+$" \
238238
# empty, then it will match.
239239
#
240240
# -=[ References ]=-
241-
# http://www.w3.org/Protocols/rfc2616/rfc2616-sec4.html#sec4.3
241+
# https://www.w3.org/Protocols/rfc2616/rfc2616-sec4.html#sec4.3
242242
#
243243
SecRule REQUEST_METHOD "@rx ^(?:GET|HEAD)$" \
244244
"id:920170,\
@@ -272,7 +272,7 @@ SecRule REQUEST_METHOD "@rx ^(?:GET|HEAD)$" \
272272
# header is also present.
273273
#
274274
# -=[ References ]=-
275-
# http://www.w3.org/Protocols/rfc2616/rfc2616-sec9.html#sec9.5
275+
# https://www.w3.org/Protocols/rfc2616/rfc2616-sec9.html#sec9.5
276276
#
277277
SecRule REQUEST_METHOD "@rx ^POST$" \
278278
"id:920180,\
@@ -308,7 +308,7 @@ SecRule REQUEST_METHOD "@rx ^POST$" \
308308
# This rule inspects the Range request header to see if it starts with 0.
309309
#
310310
# -=[ References ]=-
311-
# http://www.bad-behavior.ioerror.us/documentation/how-it-works/
311+
# http://www.bad-behavior.ioerror.us/about/
312312
#
313313
# 2. Per RFC 2616 -
314314
# "If the last-byte-pos value is present, it MUST be greater than or equal to the first-byte-pos in that byte-range-spec,
@@ -317,7 +317,7 @@ SecRule REQUEST_METHOD "@rx ^POST$" \
317317
# This rule compares the first and second byte ranges and flags when the first value is greater than the second.
318318
#
319319
# -=[ References ]=-
320-
# http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html
320+
# https://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html
321321
# http://seclists.org/fulldisclosure/2011/Aug/175
322322
#
323323
SecRule REQUEST_HEADERS:Range|REQUEST_HEADERS:Request-Range "@rx (\d+)\-(\d+)\," \
@@ -352,7 +352,7 @@ SecRule REQUEST_HEADERS:Range|REQUEST_HEADERS:Request-Range "@rx (\d+)\-(\d+)\,"
352352
# keep-alive and close options.
353353
#
354354
# -=[ References ]=-
355-
# http://www.bad-behavior.ioerror.us/documentation/how-it-works/
355+
# http://www.bad-behavior.ioerror.us/about/
356356
#
357357
SecRule REQUEST_HEADERS:Connection "@rx \b(?:keep-alive|close),\s?(?:keep-alive|close)\b" \
358358
"id:920210,\
@@ -743,7 +743,7 @@ SecRule REQUEST_HEADERS:Content-Length "!@rx ^0$" \
743743
# This rule triggers if the Host header contains all digits (and possible port)
744744
#
745745
# -=[ References ]=-
746-
# http://technet.microsoft.com/en-us/magazine/2005.01.hackerbasher.aspx
746+
# https://technet.microsoft.com/en-us/magazine/2005.01.hackerbasher.aspx
747747
#
748748

749749
SecRule REQUEST_HEADERS:Host "@rx ^[\d.:]+$" \

rules/REQUEST-941-APPLICATION-ATTACK-XSS.conf

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ SecRule TX:PARANOIA_LEVEL "@lt 1" "phase:2,id:941012,nolog,pass,skipAfter:END-RE
2323
#
2424
# -=[ Libinjection - XSS Detection ]=-
2525
#
26-
# Ref: https://libinjection.client9.com/
26+
# Ref: https://github.com/client9/libinjection
2727
# Ref: https://speakerdeck.com/ngalbreath/libinjection-from-sqli-to-xss
2828
#
2929
# -=[ Targets ]=-
@@ -660,7 +660,6 @@ SecRule REQUEST_COOKIES|!REQUEST_COOKIES:/__utm/|REQUEST_COOKIES_NAMES|ARGS_NAME
660660
setvar:tx.%{rule.id}-OWASP_CRS/WEB_ATTACK/XSS-%{matched_var_name}=%{tx.0}"
661661

662662
#
663-
# http://openmya.hacker.jp/hasegawa/security/utf7cs.html
664663
# UTF-7 encoding XSS filter evasion for IE.
665664
# Reported by Vladimir Ivanov
666665
#

rules/RESPONSE-951-DATA-LEAKAGES-SQL.conf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ SecRule TX:PARANOIA_LEVEL "@lt 1" "phase:4,id:951012,nolog,pass,skipAfter:END-RE
2323
# -=[ SQL Error Leakages ]=-
2424
#
2525
# Ref: https://raw.github.com/sqlmapproject/sqlmap/master/xml/errors.xml
26-
# Ref: https://github.com/Arachni/arachni/tree/master/modules/audit/sqli/patterns
26+
# Ref: https://github.com/Arachni/arachni/tree/master/components/checks/active/sql_injection/regexps
2727
#
2828
SecRule RESPONSE_BODY "@pmFromFile sql-errors.data" \
2929
"id:951100,\

rules/RESPONSE-952-DATA-LEAKAGES-JAVA.conf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ SecRule RESPONSE_BODY "@pmFromFile java-code-leakages.data" \
5050
#
5151
# -=[ Java Errors ]=-
5252
#
53-
# Ref: https://github.com/andresriancho/w3af/blob/master/plugins/grep/error_pages.py
53+
# Ref: https://github.com/andresriancho/w3af/blob/master/w3af/plugins/grep/error_pages.py
5454
#
5555
SecRule RESPONSE_BODY "@pmFromFile java-errors.data" \
5656
"id:952110,\

0 commit comments

Comments
 (0)