Public | Automated Build

Last pushed: 2 years ago
Short Description
It is a simple option wordpress+modsecurity + owasp core set rules
Full Description


modsecwordpress is a docker image that use wordpress image and import modsecurity module for apache and OWASP core rule set. (I'm not member of owasp core rule set project).

this is a unofficial docker image

##OWASP ModSecurity Core Rule Set (CRS)

ModSecurity™ is a web application firewall engine that provides very little protection on its own. In order to become useful, ModSecurity™ must be configured with rules. In order to enable users to take full advantage of ModSecurity™ out of the box, Trustwave's SpiderLabs is sponsoring and maintaining a free certified rule set for the community. Unlike intrusion detection and prevention systems, which rely on signatures specific to known vulnerabilities, the OWASP ModSecurity Core Rule Set provides generic protection from unknown vulnerabilities often found in web applications, which are in most cases custom coded. The Core Rules are heavily commented to allow it to be used as a step-by-step deployment guide for ModSecurity™.

check the project :

docker run --name mysql -e MYSQL_ROOT_PASSWORD=123 -d mysql (start database first)
docker run --name test --link mysql:mysql -p 80:80 -d ifpr/modsecwordpress

##New wordpress blog
IF you will install a new wordpress blog add this rules in /etc/modsecurity/whitelist.conf

<LocationMatch wp-admin/install.php>
<ifModule mod_security2.c>
SecRuleEngine Off

##After install wordpress
After you had installed create the file /etc/modsecurity-crs/base_rules/modsecurity_crs_61_custom_wordpress.conf

and put this rules:
SecRuleUpdateTargetById 950901 !REQUEST_COOKIES:'/^wp-settings-1/'
SecRuleUpdateTargetById 981172 !REQUEST_COOKIES:'/^wp-settings-1/'
SecRuleUpdateTargetById 981172 !REQUEST_COOKIES:'/^s_sq/'
SecRuleUpdateTargetById 981172 !REQUEST_COOKIES:'/^zem_rp_click/'


Docker Pull Command
Source Repository