Plugin triggers ModSecurity
-
Hello Matt and Devin,
I thought you might want to know that I can confirm the same issue that user “artxlb” posted in https://www.ads-software.com/support/topic/server-security-problems-caused-by-give?replies=1 does indeed exist. I have no relation to “artxlb” but I noticed his thread when I arrived here this morning researching the same issue for a hosting client of mine.
I can also provide you some more detailed information that could be useful to you.
Server Environment – CloudLinux 6.7 (based CentOS 6) with cPanel 11.56 latest “release” tier, suPHP, ModSecurity 2.5.x with WAF Comodo rules, Apache 2.4.18, PHP 5.5.49
WordPress – version 4.5.3 with Twenty Sixteen default theme
“Give” Donation Plugin – version 1.5.2
Symptom Brief – When admin user logs in to Dashboard, the Give Plugin triggers ModSecurity rule # 220030 multiple times and user IP is blocked in server’s firewall as the Give Plugin calls the icomoon.ttf and icomoon.woff font files.
Detailed Symptom Output (with user IP address and actual domain changed for security) from Apache log during the trigger looks like this:
[Sun Jul 24 05:30:03.337332 2016] [:error] [client xxx.xxx.xxx.xxx] ModSecurity: Access denied with code 403 (phase 1). Pattern match "^(-(a|b|C|q|T|c|n|d|e|f|h|\\\\?|i|l|m|r|B|R|F|E|S|t|s|v|w|z)|--(interactive|bindpath|no-chdir|no-header|timing|php-ini|no-php-ini|define|profile-info|file|help|usage|info|syntax-check|modules|run|process-begin|process-code|process-file|process-end|server ..." at QUERY_STRING. [file "/usr/local/apache/conf/modsec_vendor_configs/comodo_apache/22_PHP_PHPGen.conf"] [line "17"] [id "220030"] [rev "2"] [msg "COMODO WAF: Vulnerability in PHP before 5.3.12 and 5.4.x before 5.4.2 (CVE-2012-1823)||www.example.com|F"] [hostname "www.example.com"] [uri "/wp-content/plugins/give//assets/fonts/icomoon.ttf"] [Sun Jul 24 05:36:12.493234 2016] [:error] [client xxx.xxx.xxx.xxx] ModSecurity: Access denied with code 403 (phase 1). Pattern match "^(-(a|b|C|q|T|c|n|d|e|f|h|\\\\?|i|l|m|r|B|R|F|E|S|t|s|v|w|z)|--(interactive|bindpath|no-chdir|no-header|timing|php-ini|no-php-ini|define|profile-info|file|help|usage|info|syntax-check|modules|run|process-begin|process-code|process-file|process-end|server ..." at QUERY_STRING. [file "/usr/local/apache/conf/modsec_vendor_configs/comodo_apache/22_PHP_PHPGen.conf"] [line "17"] [id "220030"] [rev "2"] [msg "COMODO WAF: Vulnerability in PHP before 5.3.12 and 5.4.x before 5.4.2 (CVE-2012-1823)||www.example.com|F"] [hostname "www.example.com"] [uri "/wp-content/plugins/give//assets/fonts/icomoon.woff"]
The strange thing is that, as you can see, the vulnerability being detected is an old one apparently from 2012 with PHP versions below 5.4.2, and yet the server is running PHP 5.5.49. It seems as if the Give Plugin code reflects or references older PHP version syntax despite the Plugin being the most recent version update (1.5.2 , 3 weeks ago) from WordImpress.
Troubleshooting and verification method:
– Ensure latest version of WordPress properly installed
– Used WordPress default Twenty Sixteen theme
– Disabled Plugins one at a time while testing* Problem goes away only when “Give – Donation Plugin” is deactivated *
Temporary work-arounds:
– Deactivate / don’t use “Give – Donation Plugin” OR
– Disable ModSecurity Rule ID 220030 for user’s hosting account on serverSince disabling the ModSecurity rule is not a permanent nor ideal solution as it’s there to protect user’s site & scripts, I’m hoping that the information I’ve provided above might help lead to a permanent fix.
I’m sure you guys are extremely busy, so I’m wondering – do you think a near-future fix for this is possibly forthcoming?
If there is any other information I could provide that might be helpful just let me know and I’ll do my best.
Thanks guys!
- The topic ‘Plugin triggers ModSecurity’ is closed to new replies.