## nginx 拦截非法字符,nginx禁止url访问特定字符,nginx过滤url访问
参考代码一
#前缀为无限,后面的精准屏蔽字符 123
if ($request_uri ~* "123") {
return 403 "I've recorded your ip Wait to check the water meter";
}
参考代码二
#前缀为index.php,后面的精准屏蔽字符 123
if ($request_uri ~* "/index.php\123") {
return 403 "I've recorded your ip Wait to check the water meter";
}
参考代码三
location / {
# 当访问的url中含有/%#时返回404
if ($request_uri ~* "/%#") {
return 404;
}
#当访问url的后面带有?的链接 返回404
if ($request_uri ~* ^/a/m/(.*)\.html\?(.*)$) {
return 404;
}
}
注释:
过滤链接中的?在nginx的配置文件中写入
location / {# 当访问的url中含有/%#时返回404if ($request_uri ~* "/%#") {return 404;}#
当访问url的后面带有?的链接 返回404if ($request_uri ~*^/a/m/(.*)\.html\?(.*)$) {return 404;
nginx 正则表达式
=开头表示精确匹配,如 A 中只匹配根目录结尾的请求,后面不能带任何字符串。
^~ 开头表示uri以某个常规字符串开头,不是正则匹配
~ 开头表示区分大小写的正则匹配;
~* 开头表示不区分大小写的正则匹配
.* .匹配任意字符,*匹配数量0到正无穷;
\. \转义,匹配.
/ 通用匹配, 如果没有其它匹配,任何请求都会匹配到
本站测试代码,小白一键复制(注:需要自行根据网站程序定义)
宝塔为例:/www/server/panel/vhost/nginx/你的网站域名.conf,复制代码点击保存
#前缀为无限,后面的是屏蔽字符
if ($request_uri ~* "../../../../../../") {
return 403 "I've recorded your ip Wait to check the water meter";
}
#前缀为无限,后面的是屏蔽字符
if ($request_uri ~* ";") {
return 403 "I've recorded your ip Wait to check the water meter";
}
#前缀为无限,后面的是屏蔽字符
if ($request_uri ~* "&") {
return 403 "I've recorded your ip Wait to check the water meter";
}
#前缀为无限,后面的是屏蔽字符
if ($request_uri ~* "base64") {
return 403 "I've recorded your ip Wait to check the water meter";
}
#前缀为index.php屏蔽,后面的是屏蔽字符
if ($request_uri ~* "/index.php\&") {
return 403 "I've recorded your ip Wait to check the water meter";
}
#前缀为index.php屏蔽,后面的是屏蔽字符
if ($request_uri ~* "/index.php\?") {
return 403 "I've recorded your ip Wait to check the water meter";
}
#前缀为index.php屏蔽,后面的是屏蔽字符
if ($request_uri ~* "/index.php\;") {
return 403 "I've recorded your ip Wait to check the water meter";
}
#前缀为index.php屏蔽,后面的是屏蔽字符
if ($request_uri ~* "/index.php\=") {
return 403 "I've recorded your ip Wait to check the water meter";
}
#前缀为index.php屏蔽,后面的是屏蔽字符
if ($request_uri ~* "/index.php\=") {
return 403 "I've recorded your ip Wait to check the water meter";
}
#前缀为index.php屏蔽,后面的是屏蔽字符
if ($request_uri ~* "/index.php\_") {
return 403 "I've recorded your ip Wait to check the water meter";
}
#前缀为index.php屏蔽,后面的是屏蔽字符
if ($request_uri ~* "/index.php\./") {
return 403 "I've recorded your ip Wait to check the water meter";
}
#前缀为index.php屏蔽,后面的是屏蔽字符
if ($request_uri ~* "/index.php\:") {
return 403 "I've recorded your ip Wait to check the water meter";
}
#前缀为index.php屏蔽,后面的是屏蔽字符
if ($request_uri ~* "/index.php\base64") {
return 403 "I've recorded your ip Wait to check the water meter";
}
#前缀为index.php屏蔽,后面的是屏蔽字符
if ($request_uri ~* "/index.php\%") {
return 403 "I've recorded your ip Wait to check the water meter";
}
#前缀为index.php屏蔽,后面的是屏蔽字符
if ($request_uri ~* "/index.php\wp-content") {
return 403 "I've recorded your ip Wait to check the water meter";
}
#前缀为index.php屏蔽,后面的是屏蔽字符
if ($request_uri ~* "/index.php\;amp") {
return 403 "I've recorded your ip Wait to check the water meter";
}
## 附带:nginx ql语句过滤、文件注入禁止、溢出攻击过滤、spam字段过滤、user-agents头过滤
sql语句过滤
if ($request_uri ~* "(cost\()|(concat\()") {
return 444;
}
if ($request_uri ~* "[+|(%20)]union[+|(%20)]") {
return 444;
}
if ($request_uri ~* "[+|(%20)]and[+|(%20)]") {
return 444;
}
if ($request_uri ~* "[+|(%20)]select[+|(%20)]") {
return 444;
}
文件注入禁止
set $block_file_injections 0;
if ($query_string ~ “[a-zA-Z0-9_]=//”) {
set $block_file_injections 1;
}
if ($query_string ~ “[a-zA-Z0-9_]=(\.\.//?)+”) {
set $block_file_injections 1;
}
if ($query_string ~ “[a-zA-Z0-9_]=/([a-z0-9_.]//?)+”) {
set $block_file_injections 1;
}
if ($block_file_injections = 1) {
return 444;
}
溢出攻击过滤
set $block_common_exploits 0;
if ($query_string ~ “(<|%3C).*script.*(>|%3E)”) {
set $block_common_exploits 1;
}
if ($query_string ~ “GLOBALS(=|\[|\%[0-9A-Z]{0,2})”) {
set $block_common_exploits 1;
}
if ($query_string ~ “_REQUEST(=|\[|\%[0-9A-Z]{0,2})”) {
set $block_common_exploits 1;
}
if ($query_string ~ “proc/self/environ”) {
set $block_common_exploits 1;
}
if ($query_string ~ “mosConfig_[a-zA-Z_]{1,21}(=|\%3D)”) {
set $block_common_exploits 1;
}
if ($query_string ~ “base64_(en|de)code\(.*\)”) {
set $block_common_exploits 1;
}
if ($block_common_exploits = 1) {
return 444;
}
spam字段过滤
set $block_spam 0;
if ($query_string ~ “\b(ultram|unicauca|valium|viagra|vicodin|xanax|ypxaieo)\b”) {
set $block_spam 1;
}
if ($query_string ~ “\b(erections|hoodia|huronriveracres|impotence|levitra|libido)\b”) {
set $block_spam 1;
}
if ($query_string ~ “\b(ambien|blue\spill|cialis|cocaine|ejaculation|erectile)\b”) {
set $block_spam 1;
}
if ($query_string ~ “\b(lipitor|phentermin|pro[sz]ac|sandyauer|tramadol|troyhamby)\b”) {
set $block_spam 1;
}
if ($block_spam = 1) {
return 444;
}
user-agents头过滤
set $block_user_agents 0;
if ($http_user_agent ~ “Wget”) {
set $block_user_agents 1;
}
# Disable Akeeba Remote Control 2.5 and earlier
if ($http_user_agent ~ “Indy Library”) {
set $block_user_agents 1;
}
# Common bandwidth hoggers and hacking tools.
if ($http_user_agent ~ “libwww-perl”) {
set $block_user_agents 1;
}
if ($http_user_agent ~ “GetRight”) {
set $block_user_agents 1;
}
if ($http_user_agent ~ “GetWeb!”) {
set $block_user_agents 1;
}
if ($http_user_agent ~ “Go!Zilla”) {
set $block_user_agents 1;
}
if ($http_user_agent ~ “Download Demon”) {
set $block_user_agents 1;
}
if ($http_user_agent ~ “Go-Ahead-Got-It”) {
set $block_user_agents 1;
}
if ($http_user_agent ~ “TurnitinBot”) {
set $block_user_agents 1;
}
if ($http_user_agent ~ “GrabNet”) {
set $block_user_agents 1;
}
if ($block_user_agents = 1) {
return 444;
}
}
自动防护
if ($request_uri ~* \.(htm|do)\?(.*)$) {
set $req $2;
}
if ($req ~* "(cost\()|(concat\()") {
return 503;
}
if ($req ~* "union[+|(%20)]") {
return 503;
}
if ($req ~* "and[+|(%20)]") {
return 503;
}
if ($req ~* "select[+|(%20)]") {
return 503;
}
注:使用上也需要进行相应的调整