I tested BanonCMDi and BanonCMDi + PreventCMDi with this exploit to test the function: hxxp://milw0rm.com/exploits/7731
After send the CMD with a pipe ( | ) in POST-Content the /tmp/dupa with output of uname -a is availible and i'm not blocked. Is there something wrong with my conf?
ConnectionsTotal = 150
ConnectionsPerIP = 10
SystemLogfile = /usr/local/var/log/hiawatha/system.log
AccessLogfile = /usr/local/var/log/hiawatha/access.log
ErrorLogfile = /usr/local/var/log/hiawatha/error.log
GarbageLogfile = /usr/local/var/log/hiawatha/garbage.log
ServerString = Blub0r
Binding {
Port = 80
}
BanOnCMDi = 300
BanOnSQLi = 300
BanOnGarbage = 300
BanOnMaxPerIP = 60
BanOnMaxReqSize = 300
KickOnBan = yes
RebanDuringBan = yes
PreventCMDi = yes
ExecuteCGI = yes
CGIhandler = /usr/bin/php-cgi:php
CGIhandler = /usr/bin/perl:pl
CGIextension = cgi
Hostname = 127.0.0.1
WebsiteRoot = /usr/local/var/www/hiawatha
StartFile = index.php
AccessLogfile = /usr/local/var/log/hiawatha/access.log
ErrorLogfile = /usr/local/var/log/hiawatha/error.log