1 amoun Feb 08, 2019 02:35
3 amoun Feb 13, 2019 20:39
Thanks
host "just whitelisted two mod_security rules" and all is fine
340162 - This rule detects possible Remote File Injection attempts.
340465 - provide a base level of protection for any web application
Here is the hosts log
Message: Access denied with code 403 (phase 2). Test 'MATCHED_VARS' against '!@rx ://%{SERVER_NAME}/' is true.
[file "/etc/apache2/conf.d/modsec_rules/10_asl_rules.conf"] [line "1352"] [id "340465"] [rev "58"]
[msg "Atomicorp.com WAF Rules: Remote File Injection attempt in ARGS (admin.php)"] [severity "CRITICAL"]
[MatchedString "https://twitter.com/b2evolution/"][MatchedString "https://twitter.com/b2evolution/"]
host :: Its a server-wide settings as such it will just reject any remote file injections
me :: But was there really an attempt by twitter?
host :: As the rule was incorrectly triggering the above function, I had to disable that rule for your account
me ::So the rule isn't quite right??
host :: The rule is correct but it was incorrectly triggering your genuine attempt
NOW I just have to find how to remove those pesky links, I suppose they are widgets/plugins hopefully. Can find a way under users or profiles to send twitter to it's death. OK DONE
4 poorboy2 Feb 17, 2019 20:37
My host is super security minded. If I do something that violates a mod_security rule, they lock me out of all my sites. I have love/hate feelings about it. All I have to do is log into my account and click unblock IP and I've gotten used to it but the first time, I had no idea what was going on. Also happens if smtp, ssh, ftp log in fails a few times.
Couple of typos on that mod-sec wiki page. (sorry, I'm a proof reader without trying)
Should be "is a PITA" - current "in a PITA
Should be "in the HTTP" - current "inthe HTTP"
5 fplanque Feb 18, 2019 02:36
Couple of typos fixed, and then some...
https://b2evolution.net/man/error-message-not-by-b2evolution
my guess: "smart security module" by web host.