MODULE | Protector |
---|---|
Description | Protector is a module to secure XCL Web Application Platform and CMS from various and malicious attacks.. |
Render Engine | Smarty v2 and XCube Layout |
Version | 3.58.0 |
Author | Nobuhiro Yasutomi @nbuy XCL PHP8 |
Author | Nuno Luciano @gigamaster XCL PHP7 |
Author | Original by Gijoe (https://peak.ne.jp/) |
Copyright | 2005-2023 Authors |
License | GPL |
Apache, Nginx, etc. PHP 7.2 - PHP 8.2
MySQL 5.6, MariaDB InnoDB utf8 / utf8mb4
XCL version 2.3.+
Protector safeguards your website against multiple security threats including DoS attacks, SQL Injection, XSS vulnerabilities, session hijacking, and global variable contamination, Content Security Policy (CSP) implementation, CORS protection, IP filtering, brute force prevention, and comprehensive security logging.
- Content Security Policy (CSP)
- DoS attack and Bad Crawlers (and bots collecting e-mails)
- SQL Injection
- XSS (not all though)
- System globals pollution
- Session hi-jacking
- Null-bytes
- Directory Traversal
- Some sort of CSRF
- Brute Force
- Camouflaged Image File Uploading (== IE Content-Type XSS)
- Executable File Uploading Attack
- XMLRPC's eval() and SQL Injection Attacks
- SPAMs for comment, trackback etc.
The Web Proxy feature in the Protector module offers several layers of protection when accessing external resources:
-
Content Filtering: The proxy scans external content for malicious code, scripts, or other harmful elements before delivering it to users.
-
URL Validation: It validates external URLs to prevent access to known malicious websites or phishing domains.
-
Identity Protection: By routing requests through your server, it masks the identity of your users when they access external resources.
-
Resource Caching: As shown in the dashboard statistics, it caches external resources to improve performance and reduce repeated exposure to potentially harmful content.
-
Access Control: The proxy can restrict access to certain types of content or domains based on configurable rules.
-
Malicious Request Blocking: The dashboard shows "Blocked Malicious" statistics, indicating that it actively blocks requests that appear to be harmful.
-
Traffic Monitoring: It logs all proxy requests, allowing administrators to review access patterns and identify potential security issues.
This proxy acts as a security intermediary between your users and external web content, similar to how corporate proxies protect internal networks.
It's particularly useful when you need to display or access external content within your XOOPSCube site while maintaining security controls.
The statistics displayed in the dashboard (total requests, cached resources, and blocked malicious requests) help you monitor the proxy's effectiveness in protecting your site.