-
Notifications
You must be signed in to change notification settings - Fork 508
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
url_args_attack_check功能报错,请大神帮忙解决 #9
Comments
修改waf/init.lua 文件
完整代码
|
大佬。关于这个问题你遇到过吗?openresty 1.20版本 |
|
修改lib.lua 代码, CLIENT_IP 加个local 修饰就好了
推荐使用这个库 https://github.com/xsec-lab/x-waf 基于这个仓库优化了一遍代码代码规范的多。 不过还是存在url_args_attack_check 报错问题 记得加上我打的补丁就好了。 |
谢谢大佬 |
waf的url_args_attack_check功能报错,请大神帮忙解决。
报错详细如下:
[C]: in function 'concat'
/usr/local/openresty1.11/nginx/conf/waf/init.lua:130: in function 'url_args_attack_check'
/usr/local/openresty1.11/nginx/conf/waf/access.lua:11: in function 'waf_main'
/usr/local/openresty1.11/nginx/conf/waf/access.lua:18: in function </usr/local/openresty1.11/nginx/conf/waf/access.lua:1>, client: 118.91.92.132, server: g.share.com, request: "GET /gamepage/egg.php?lxt&&cd=0<=d96628e0ads&vs=0 HTTP/1.1", host: "g.share.com"
The text was updated successfully, but these errors were encountered: