Skip to content

Commit

Permalink
Add MacOS specific file for web-related checks (#331)
Browse files Browse the repository at this point in the history
Mainly because in MacOS, the paths for the web-related directories
seem to be located in different places compared to Linux.
  • Loading branch information
Juan Ferriz committed Apr 3, 2019
1 parent 0b4992b commit fe787f6
Showing 1 changed file with 133 additions and 0 deletions.
133 changes: 133 additions & 0 deletions sca/macos/system_audit_rcl_mac.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,133 @@
# Security Configuration assessment
# Checks for auditing Mac systems
# Copyright (C) 2015-2019, Wazuh Inc.
#
# This program is a free software; you can redistribute it
# and/or modify it under the terms of the GNU General Public
# License (version 2) as published by the FSF - Free Software
# Foundation

policy:
id: "system_audit_rcl_mac"
file: "system_audit_rcl_mac.yml"
name: "System audit for web-related vulnerabilities"
description: "Guidance for establishing a secure configuration for web-related vulnerabilities."

variables:
$php.ini: /etc/php.ini,/var/www/conf/php.ini,/etc/php5/apache2/php.ini;
$web_dirs: /Library/WebServer/Documents,/usr/htdocs,/usr/local/var/htdocs,/usr/local/var/www;


# PHP checks
checks:
- id: 1000
title: "PHP - Register globals are enabled"
condition: any
rules:
- 'f:$php.ini -> r:^register_globals = On;'
- id: 1001
title: "PHP - Expose PHP is enabled"
condition: any
rules:
- 'f:$php.ini -> r:^expose_php = On;'
- id: 1002
title: "PHP - Allow URL fopen is enabled"
condition: any
rules:
- 'f:$php.ini -> r:^allow_url_fopen = On;'
- id: 1003
title: "PHP - Displaying of errors is enabled"
condition: any
rules:
- 'f:$php.ini -> r:^display_errors = On;'
# WEB checks
- id: 1004
title: "Web exploits: '.yop' is an uncommon file name inside htdocs - Possible compromise"
compliance:
- pci_dss: "6.5, 6.6, 11.4"
condition: any
rules:
- 'd:$web_dirs -> ^.yop$;'
- id: 1005
title: "Web exploits: 'id' is an uncommon file name inside htdocs - Possible compromise"
compliance:
- pci_dss: "6.5, 6.6, 11.4"
condition: any
rules:
- 'd:$web_dirs -> ^id$;'
- id: 1006
title: "Web exploits: '.ssh' is an uncommon file name inside htdocs"
compliance:
- pci_dss: "6.5, 6.6, 11.4"
condition: any
rules:
- 'd:$web_dirs -> ^.ssh$;'
- id: 1007
title: "Web exploits: '...' is an uncommon file name inside htdocs - Possible compromise"
compliance:
- pci_dss: "6.5, 6.6, 11.4"
condition: any
rules:
- 'd:$web_dirs -> ^...$;'
- id: 1008
title: "Web exploits: '.shell' is an uncommon file name inside htdocs - Possible compromise"
compliance:
- pci_dss: "6.5, 6.6, 11.4"
condition: any
rules:
- 'd:$web_dirs -> ^.shell$;'
# Outdated Web applications
- id: 1009
title: "Web vulnerability - Outdated WordPress installation"
compliance:
- pci_dss: "6.5, 6.6, 11.4"
condition: any
rules:
- 'd:$web_dirs -> ^version.php$ -> r:^\.wp_version && >:$wp_version = ''4.4.2'';'
- id: 1010
title: "Web vulnerability - Outdated Joomla installation"
compliance:
- pci_dss: "6.5, 6.6, 11.4"
condition: any
rules:
- 'd:$web_dirs -> ^version.php$ -> r:var \.RELEASE && r:''3.4.8'';'
- id: 1011
title: "Web vulnerability - Outdated osCommerce (v2.2) installation"
compliance:
- pci_dss: "6.5, 6.6, 11.4"
condition: any
rules:
- "d:$web_dirs -> ^application_top.php$ -> r:'osCommerce 2.2-;"
# Known backdoors
- id: 1012
title: "Web vulnerability - Backdoors / Web based malware found - eval(base64_decode)"
compliance:
- pci_dss: "6.5, 6.6, 11.4"
condition: any
rules:
- 'd:$web_dirs -> .php$ -> r:eval\(base64_decode\(\paWYo;'
- id: 1013
title: "Web vulnerability - Backdoors / Web based malware found - eval(base64_decode(POST))"
compliance:
- pci_dss: "6.5, 6.6, 11.4"
condition: any
rules:
- 'd:$web_dirs -> .php$ -> r:eval\(base64_decode\(\S_POST;'
- id: 1014
title: "Web vulnerability - .htaccess file compromised"
compliance:
- pci_dss: "6.5, 6.6, 11.4"
references:
- https://blog.sucuri.net/2011/05/understanding-htaccess-attacks-part-1.html
condition: any
rules:
- 'd:$web_dirs -> ^.htaccess$ -> r:RewriteCond \S+HTTP_REFERERS \S+google;'
- id: 1015
title: "Web vulnerability - .htaccess file compromised - auto append"
compliance:
- pci_dss: "6.5, 6.6, 11.4"
references:
- https://blog.sucuri.net/2011/05/understanding-htaccess-attacks-part-1.html
condition: any
rules:
- 'd:$web_dirs -> ^.htaccess$ -> r:php_value auto_append_file;'

0 comments on commit fe787f6

Please sign in to comment.