diff options
author | Vsevolod Stakhov <vsevolod@highsecure.ru> | 2016-11-26 14:51:19 +0000 |
---|---|---|
committer | Vsevolod Stakhov <vsevolod@highsecure.ru> | 2016-11-26 14:51:19 +0000 |
commit | 088aaea40e1c7cd9087e21605c26d6bd439b5ef0 (patch) | |
tree | f01c501e1eb9894cc00d3bd8037d64ba0678f142 /rules/regexp/compromised_hosts.lua | |
parent | 94dc5f1a7dc677a1e4d1aef0163da59392b8311f (diff) | |
download | rspamd-088aaea40e1c7cd9087e21605c26d6bd439b5ef0.tar.gz rspamd-088aaea40e1c7cd9087e21605c26d6bd439b5ef0.zip |
[Fix] Remove or fix hyperscan incompatible regexps
Diffstat (limited to 'rules/regexp/compromised_hosts.lua')
-rw-r--r-- | rules/regexp/compromised_hosts.lua | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/rules/regexp/compromised_hosts.lua b/rules/regexp/compromised_hosts.lua index 69e77742f..e5e6e6aec 100644 --- a/rules/regexp/compromised_hosts.lua +++ b/rules/regexp/compromised_hosts.lua @@ -97,7 +97,7 @@ reconf['HAS_WP_URI'] = { } reconf['WP_COMPROMISED'] = { - re = '/\\/wp-(?!content|includes)[^\\/]+\\//Ui', + re = '/\\/wp-(?:content|includes)[^\\/]+\\//Ui', description = "URL that is pointing to a compromised WordPress installation", score = 5.0, group = "compromised_hosts" |