+ $GLOBALS['ctracker_whitelist'] = [
+ 'cmd=new', // LinPHA
+ 'cmd=edit', // LinPHA
+ 'cmd=lostpw', // LinPHA
+ '/css/status_config.php', // MantisBT
+ '/css/common_config.php', // MantisBT
+ '/javascript_config.php', // MantisBT
+ ];
+
+ // Attacks we should detect and block
+ $GLOBALS['ctracker_get_blacklist'] = [
+ // SQL injections
+ 'union ', ' union', 'insert ',
+ 'select ', ' like', 'like ', 'drop ', 'update ',
+ 'union(', 'union=',
+
+ // $GLOBAL/$_SERVER array elements
+ 'HTTP_USER_AGENT', 'HTTP_HOST', 'HTTP_PHP', '_SESSION', 'CFG_ROOT',
+ 'DOCUMENT_ROOT', '_SERVER',
+
+ // Sensitive files
+ '/environ', 'etc/shadow', 'etc/gshadow', 'etc/passwd', 'etc/group',
+ 'etc/./shadow', 'etc/./gshadow', 'etc/./passwd', 'etc/./group',
+ '.htaccess', '.htpasswd', '.htgroup', '.history', 'bash_history',
+ 'bashrc',
+
+ // Other Linux/FreeBSD/??? programs (sometimes with space)
+ 'traceroute ', 'ping ', 'bin/xterm', 'bin/./xterm', 'lsof ',
+ 'telnet ', 'wget ', 'bin/perl', 'bin/id', 'uname\x20', 'uname ',
+ 'killall', 'diff ', 'kill ', 'locate ', 'grep ', 'vi ', 'mv ',
+ 'rmdir ', 'mcd ', 'mrd ', 'rm ', ' mcd', ' mrd', ' rm',
+ 'passwd ', ' passwd', 'mdir ', ' mdir', 'cp ', ' cp',
+ 'esystem ', 'chr ', ' chr', 'wget ', ' wget', ' cmd',
+ 'cmd ', ' rush', 'rush ', ' echr', 'echr ', ' getenv',
+ 'getenv', 'reboot ', 'halt ', 'powerdown ',
+
+ // Other Linux programs (+ brace)
+ 'locate(', 'grep(', 'kill(', 'mcd(', 'mrd(', 'rm(', 'mv(', 'rmdir(',
+ 'chmod(', 'chmod(', 'chown(', 'chgrp(', 'passwd(', 'vi(', 'cp(',
+ 'mdir(', 'system(', 'chr(', 'wget(', 'rush(', 'echr(',
+
+ // Other Linux programs (+ equal)
+ 'mcd=', 'mrd=', 'chmod=', 'chr=', 'rush=', 'echr=',
+
+ // Paths
+ '/etc/', '/bin/', '/sbin/', '/self/', '/proc/', '../../','..//', '././',
+ '/home/ftp', '/home/./ftp', '/home/./www', '/home/www', '/www/virtual/',
+ '/www/./virtual/',
+
+ // Uni* commands:
+ '/chgrp', '/chown', '/chmod', 'chown ', 'chmod ', 'chgrp ',
+
+ // Compiler/interpreter
+ 'bin/g++ ', 'bin/c++ ', 'cc ', 'bin/python', 'bin/python', 'bin/tclsh',
+ 'bin/tclsh', 'bin/nasm', '/perl', 'cmd.exe',
+ 'nc.exe', 'ftp.exe',
+
+ // php.ini settings
+ 'allow_url_fopen', 'allow_url_include', 'auto_prepend_file', 'disable_functions', 'safe_mode',
+ 'open_basedir',
+
+ // PHP commands/scripts
+ 'fopen', 'fwrite', 'phpinfo()', '\<?', '?\>', 'base64_decode', 'file_put_contents',
+ 'set_magic_quotes_runtime', 'set_magic_quotes_runtime', 'display_errors', 'passthru',
+
+ // Typical PHP script remote-inclusions and typical include file names
+ '.inc.php', '.lib.php', '.class.php', 'config.php', '.inc', '_php',
+ 'php_', 'class_', '_class.php', 'db_mysql.inc',
+
+ // PHP arrays
+ '_phplib', '__callbackparam',
+
+ // Generic remote inclusion
+ '=http://', '=https://', '=php://',
+ 'path=', 'sql=',
+ '=%7BQUOT%7D', '=%5C', '=%22http','=%22ftp','=%22file','=%27http','=%27ftp',
+ '=%27file',
+
+ // Wrappers
+ 'data://', 'tcp://', 'udp://', 'raw://', 'javascript://', 'file://', 'ftp://',
+
+ // Blocked "users"
+ 'nigga(', ' nigga', 'nigga ', 'starhack', 'busca',
+
+ // Hidden HTML stuff
+ ' style=', 'style =',
+ 'overflow:auto', 'overflow: auto',
+ 'overflow :auto', 'overflow : auto',
+ 'display:hidden', 'display: hidden',
+ 'display :hidden', 'display : hidden',
+ 'height:0px', 'height: 0px','height:1px', 'height: 1px',
+ 'width:0px', 'width: 0px','width:1px', 'width: 1px',
+
+ // Uncommon user websites
+ '~root', '~ftp', '~nobody',
+
+ // Windows XP (?) hacks
+ 'xp_enumdsn', 'xp_availablemedia', 'xp_filelist', 'xp_cmdshell',
+
+ // Attempts to insert links into a badly secured URL
+ '%3E%3C',
+
+ // Request header being inserted
+ 'content-type',
+
+ // /proc/ and other forbidden paths
+ 'proc/self/environ',
+
+ // MySQL internal functions
+ 'name_const',
+
+ // @TODO Misc/unsorted
+ 'cgi-', '.eml', '$_request', '$_get', '$request', '$get', '.system',
+ '&aim', 'new_password', '&icq', '.conf', 'motd ', 'HTTP/1.',
+ 'window.open', 'img src', 'img src', '.jsp', 'servlet', 'org.apache',
+ 'wwwacl', 'server-info', 'server-status', '/servlet/con', 'http_',
+ 'secure_site, ok', 'chunked', '<script', 'mod_gzip_status', '.system',
+ 'uol.com', ',0x', '(0x', 'INSERT_RANDOM_NUMBER_HERE',
+ ];
+
+ // BLock these words found in User-Agent
+ $GLOBALS['ctracker_ua_blacklist'] = [
+ // Compiler/interpreter
+ 'bin/g++ ', 'bin/c++ ', 'cc ', 'bin/python', 'bin/python', 'bin/tclsh',
+ 'bin/tclsh', 'bin/nasm', '/perl', 'cmd.exe',
+ 'nc.exe', 'ftp.exe', 'wget ', 'system(', 'curl ',
+
+ // php.ini settings
+ 'allow_url_fopen', 'allow_url_include', 'auto_prepend_file', 'disable_functions', 'safe_mode',
+
+ // PHP commands/scripts
+ 'fopen', 'fwrite', 'phpinfo()', '\<?', '?\>', 'base64_decode', 'file_put_contents',
+ 'set_magic_quotes_runtime', 'set_magic_quotes_runtime', 'display_errors', 'passthru',