Jump to content

Recommended Posts

Posted

Indeed it is mod security. You can see the error in Plesk in the Logs for your domain.

ModSecurity: Access denied with code 403 (phase 1). Pattern match "\\\\D" at TX:1. [file "/etc/httpd/conf/modsecurity.d/rules/comodo_free/30_Apps_OtherApps.conf"] [line "4530"] [id "240950"] [rev "2"] [msg "COMODO WAF: XSS & SQL injection vulnerability in Pragyan CMS 3.0 (CVE-2015-1471)||salt.wiki.gd|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "OtherApps"] [hostname "salt.wiki.gd"] [uri "/User:Lia"] [unique_id "aZnLyrW2MUbixOOUfFzWWQAAAok"], referer: https://helionet.org/

You can actually whitelist these yourself in the Web Application Firewall page of Plesk. I went ahead and added rule 240950 to the exception list for you.

The changes will take 2 hours to take effect.

  • Like 1

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...