-
Notifications
You must be signed in to change notification settings - Fork 150
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
http-bf-wordpress_bf and admin-ajax.php #1148
Comments
We always wary about adding any files that are used by plugins to issue commands via a backend API. Since we don't know how the developer will implement these calls we found that they can be very false positive prone depending on which plugins you use. |
Makes sense, I understand. Might be my Wordfence that's installed on all pages that's causing this. Thanks for taking the time to reply. |
@tomazbc Newer versions of WordPress have switched to using WordPress brute force attacks will have to be detected via a WAF like CrowdSec's AppSec since it can inspect the HTTP traffic in detail. I posted a workaround in the Discord (Using ModSecurity, I don't know how to write AppSec rules, maybe somebody else can convert what I wrote in SecLang to CrowdSec DSL) so I'll share it here: Copy this ModSecurity rule:
Then install the CrowdSec ModSecurity collection, and create this scenario file:
Brute force attacks should be detectable now |
I think it should also trigger on admin-ajax.php like below.
Don't know if this is something new but everything posts to admin-ajax.php on my WP sites when trying to login.
The text was updated successfully, but these errors were encountered: