cPFence
Refresher below. I'll give it a try but the question was if new solution covers / and // and /// attacks.
This:
I have implemented the settings here:
https://my.cpfence.app/knowledgebase/23/How-to-Stop-XML-RPC-Attacks-Server-Wide-Using-the-cPFence-WAF.html
However, attackers are getting past that using //xmlrpc instead of /xmlrpc so the attack is making it.
You suggested this:
You can try adding another rule specifically for the double // case by using the following:
SecRule REQUEST_URI "@streq //xmlrpc.php" "id:6002,phase:1,deny,status:403,msg:'Blocking access to xmlrpc.php - cPFence'"
I did this instead, which seems to cover everything:
SecRule REQUEST_URI "@rx ^/*xmlrpc.php$" "id:6001,phase:1,deny,status:403,msg:'Blocking access to xmlrpc.php - cPFence'"