@@ -36,6 +36,7 @@ The service analyzes incoming requests asynchronously, tracks suspicious pattern
3636 - XSS (Cross-Site Scripting)
3737 - WordPress exploits
3838 - Open redirect attacks
39+ - Excessive URL-encoded nesting (4+ levels)
3940 - Code injection attempts
4041 - Sensitive file access (.env, .git, etc.)
4142- ** Automated reporting** (daily and weekly)
@@ -692,6 +693,7 @@ The test script validates:
692693- ✓ XSS attack detection
693694- ✓ WordPress exploit detection
694695- ✓ Open redirect detection
696+ - ✓ Excessive URL-encoded nesting detection
695697- ✓ Sensitive file access blocking
696698- ✓ Rate limit enforcement
697699- ✓ Legitimate traffic handling
@@ -747,9 +749,14 @@ curl -H "X-Real-IP: 192.168.1.102" \
747749 -H " X-Original-URI: /login?redirect=http://evil.com" \
748750 http://localhost:8080/check
749751
750- # 4. Rate limiting (send 10 rapid requests)
752+ # 4. Excessive URL-encoded nesting
753+ curl -H " X-Real-IP: 192.168.1.103" \
754+ -H " X-Original-URI: /cuenta/crear?returnUrl=/cuenta/crear?returnUrl%3D/cuenta/ingresar?returnUrl%253D/cuenta/crear?returnUrl%25253D/productos" \
755+ http://localhost:8080/check
756+
757+ # 5. Rate limiting (send 10 rapid requests)
751758for i in {1..10}; do
752- curl -H " X-Real-IP: 192.168.1.103 " \
759+ curl -H " X-Real-IP: 192.168.1.104 " \
753760 -H " X-Original-URI: /api/data" \
754761 http://localhost:8080/check
755762done
0 commit comments