Quote
Forbidden
You don't have permission to access /edit_profile.php on this server.
Additionally, a 403 Forbidden error was encountered while trying to use an ErrorDocument to handle the request.
Quote
[Wed May 04 23:13:48.729378 2016] [:error] [pid 4987] [client 103.61.55.131] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?i:\\\\b(?:t(?:able_name\\\\b|extpos[^a-zA-Z0-9_]{1,}\\\\()|(?:a(?:ll_objects|tt(?:rel|typ)id)|column_(?:id|name)|mb_users|object_(?:id|(?:nam|typ)e)|pg_(?:attribute|class)|rownum|s(?:ubstr(?:ing){0,1}|ys(?:c(?:at|o(?:lumn|nstraint)s)|dba|ibm|(?:filegroup|o ..." at ARGS_NAMES:user_password. [file "/var/cpanel/cwaf/rules/23_SQL_SQLi.conf"] [line "18"] [id "211540"] [rev "5"] [msg "COMODO WAF: Blind SQL Injection Attack"] [data "Matched Data: user_password found within ARGS_NAMES:user_password: user_password"] [severity "CRITICAL"] [hostname "gour.subodh.info"] [uri "/edit_profile.php"] [unique_id "Vyq6bK6O77UAABN721cAAAAH"] [Wed May 04 23:18:46.292684 2016] [:error] [pid 5882] [client 103.61.55.131] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?i:\\\\b(?:t(?:able_name\\\\b|extpos[^a-zA-Z0-9_]{1,}\\\\()|(?:a(?:ll_objects|tt(?:rel|typ)id)|column_(?:id|name)|mb_users|object_(?:id|(?:nam|typ)e)|pg_(?:attribute|class)|rownum|s(?:ubstr(?:ing){0,1}|ys(?:c(?:at|o(?:lumn|nstraint)s)|dba|ibm|(?:filegroup|o ..." at ARGS_NAMES:user_password. [file "/var/cpanel/cwaf/rules/23_SQL_SQLi.conf"] [line "18"] [id "211540"] [rev "5"] [msg "COMODO WAF: Blind SQL Injection Attack"] [data "Matched Data: user_password found within ARGS_NAMES:user_password: user_password"] [severity "CRITICAL"] [hostname "gour.subodh.info"] [uri "/edit_profile.php"] [unique_id "Vyq7la6O77UAABb6MlQAAAAI"] [Wed May 04 23:25:31.511526 2016] [:error] [pid 4987] [client 103.61.55.131] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?i:\\\\b(?:t(?:able_name\\\\b|extpos[^a-zA-Z0-9_]{1,}\\\\()|(?:a(?:ll_objects|tt(?:rel|typ)id)|column_(?:id|name)|mb_users|object_(?:id|(?:nam|typ)e)|pg_(?:attribute|class)|rownum|s(?:ubstr(?:ing){0,1}|ys(?:c(?:at|o(?:lumn|nstraint)s)|dba|ibm|(?:filegroup|o ..." at ARGS_NAMES:user_password. [file "/var/cpanel/cwaf/rules/23_SQL_SQLi.conf"] [line "18"] [id "211540"] [rev "5"] [msg "COMODO WAF: Blind SQL Injection Attack"] [data "Matched Data: user_password found within ARGS_NAMES:user_password: user_password"] [severity "CRITICAL"] [hostname "gour.subodh.info"] [uri "/edit_profile1.php"] [unique_id "Vyq9K66O77UAABN723QAAAAH"] [Wed May 04 23:28:45.552071 2016] [:error] [pid 3494] [client 103.61.55.131] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?i:\\\\b(?:t(?:able_name\\\\b|extpos[^a-zA-Z0-9_]{1,}\\\\()|(?:a(?:ll_objects|tt(?:rel|typ)id)|column_(?:id|name)|mb_users|object_(?:id|(?:nam|typ)e)|pg_(?:attribute|class)|rownum|s(?:ubstr(?:ing){0,1}|ys(?:c(?:at|o(?:lumn|nstraint)s)|dba|ibm|(?:filegroup|o ..." at ARGS_NAMES:user_password. [file "/var/cpanel/cwaf/rules/23_SQL_SQLi.conf"] [line "18"] [id "211540"] [rev "5"] [msg "COMODO WAF: Blind SQL Injection Attack"] [data "Matched Data: user_password found within ARGS_NAMES:user_password: user_password"] [severity "CRITICAL"] [hostname "gour.subodh.info"] [uri "/edit_profile.php"] [unique_id "Vyq97a6O77UAAA2mf-gAAAAK"] [Wed May 04 23:36:51.924076 2016] [:error] [pid 10670] [client 103.61.55.131] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?i:\\\\b(?:t(?:able_name\\\\b|extpos[^a-zA-Z0-9_]{1,}\\\\()|(?:a(?:ll_objects|tt(?:rel|typ)id)|column_(?:id|name)|mb_users|object_(?:id|(?:nam|typ)e)|pg_(?:attribute|class)|rownum|s(?:ubstr(?:ing){0,1}|ys(?:c(?:at|o(?:lumn|nstraint)s)|dba|ibm|(?:filegroup|o ..." at ARGS_NAMES:user_password. [file "/var/cpanel/cwaf/rules/23_SQL_SQLi.conf"] [line "18"] [id "211540"] [rev "5"] [msg "COMODO WAF: Blind SQL Injection Attack"] [data "Matched Data: user_password found within ARGS_NAMES:user_password: user_password"] [severity "CRITICAL"] [hostname "www.gamersworlds.com"] [uri "/edit_profile.php"] [unique_id "Vyq-066O77UAACmuJ6UAAAAI"]
SecRule REMOTE_ADDR "^xxx.xxx.xxx.xxxq$" phase:1,nolog,allow,ctl:ruleEngine=Off,id:999941
#SecRuleEngine DetectionOnly
SecRuleEngine On
Category Forum
Suspected Bugs and Errors - 8Labels
None yet
Statistics
4 participants
Notifications
You are not receiving notifications from this thread.
Related Questions