Hey, i experience a lot of errors in the APACHE log from the OWASP 3.0 cPanel vendor.
This is my apache log:
I see another guy gets errors very similar to mine:
forums.cpanel.net
_____________________________
I got confused,
cPanel create Vendor rules will generate errors non-stop on his own log? is not make sense.
or do these errors actually need to appear in the log?
I don't know is not make sense.
Is looking to you normal to get all the errors because of the OWASP rules set? every 5 seconds in the log?
I don't think so, I a little bit wirred.
need guidance guys.
Please help.
This is my apache log:
Code:
Log Messages
[Sun Sep 05 05:26:38.981372 2021][:error] [pid 13467:tid 47640012740352] [client 45.146.164.110:0] [client 45.146.164.110] ModSecurity: Warning. Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "735"] [id "920350"] [msg "Host header is a numeric IP address"] [data "198.46.88.63"] [severity "WARNING"] [ver "OWASP_CRS/3.3.2"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [tag "PCI/6.5.10"] [hostname "198.46.88.63"] [uri "/"] [unique_id "YTSNTi0AZDjcZz_Q1_nymAAAAMY"] [Sun Sep 05 05:26:38.891279 2021] [:error] [pid 13397:tid 47640002234112] [client 45.146.164.110:0] [client 45.146.164.110] ModSecurity: Warning. Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "735"] [id "920350"] [msg "Host header is a numeric IP address"] [data "198.46.88.63"] [severity "WARNING"] [ver "OWASP_CRS/3.3.2"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [tag "PCI/6.5.10"] [hostname "198.46.88.63"] [uri "/_ignition/execute-solution"] [unique_id "YTSNTlym1HRkmy6xhGgslQAAAIE"] [Sun Sep 05 05:26:38.618408 2021] [:error] [pid 13332:tid 47640002234112] [client 45.146.164.110:0] [client 45.146.164.110] ModSecurity: Warning. Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "735"] [id "920350"] [msg "Host header is a numeric IP address"] [data "198.46.88.63"] [severity "WARNING"] [ver "OWASP_CRS/3.3.2"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [tag "PCI/6.5.10"] [hostname "198.46.88.63"] [uri "/Autodiscover/Autodiscover.xml"] [unique_id "YTSNTsqWFjVSrKVZWg_pWwAAAEE"] [Sun Sep 05 05:26:38.574010 2021] [:error] [pid 13308:tid 47640004335360] [client 45.146.164.110:0] [client 45.146.164.110] ModSecurity: Warning. Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "735"] [id "920350"] [msg "Host header is a numeric IP address"] [data "198.46.88.63"] [severity "WARNING"] [ver "OWASP_CRS/3.3.2"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [tag "PCI/6.5.10"] [hostname "198.46.88.63"] [uri "/console/"] [unique_id "YTSNTtagryVXEO6t6D_h7QAAAAI"] [Sun Sep 05 05:26:38.341683 2021] [:error] [pid 13528:tid 47640006436608] [client 45.146.164.110:0] [client 45.146.164.110] ModSecurity: Access denied with code 406 (phase 2). Match of "rx ^0?$" against "REQUEST_HEADERS:Content-Length" required. [file "/etc/apache2/conf.d/imh-modsec/01_base_rules.conf"] [line "10"] [id "960011"] [msg "GET or HEAD requests with bodies"] [severity "CRITICAL"] [tag "PROTOCOL_VIOLATION/EVASION"] [hostname "198.46.88.63"] [uri "/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php"] [unique_id "YTSNTmY6Y9ZH99jP5WBmyQAAAQM"] [Sun Sep 05 05:26:38.304811 2021] [:error] [pid 13467:tid 47640002234112] [client 45.146.164.110:0] [client 45.146.164.110] ModSecurity: Warning. Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "735"] [id "920350"] [msg "Host header is a numeric IP address"] [data "198.46.88.63"] [severity "WARNING"] [ver "OWASP_CRS/3.3.2"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [tag "PCI/6.5.10"] [hostname "198.46.88.63"] [uri "/wp-content/plugins/wp-file-manager/readme.txt"] [unique_id "YTSNTi0AZDjcZz_Q1_nymAAAAME"] [Sun Sep 05 05:26:38.068236 2021] [:error] [pid 13397:tid 47640050562816] [client 45.146.164.110:0] [client 45.146.164.110] ModSecurity: Warning. Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "735"] [id "920350"] [msg "Host header is a numeric IP address"] [data "198.46.88.63"] [severity "WARNING"] [ver "OWASP_CRS/3.3.2"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [tag "PCI/6.5.10"] [hostname "198.46.88.63"] [uri "/"] [unique_id "YTSNTlym1HRkmy6xhGgslQAAAJg"] [Sun Sep 05 05:26:38.042065 2021] [:error] [pid 13332:tid 47640000132864] [client 45.146.164.110:0] [client 45.146.164.110] ModSecurity: Warning. Operator GE matched 5 at TX:inbound_anomaly_score. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/RESPONSE-980-CORRELATION.conf"] [line "91"] [id "980130"] [msg "Inbound Anomaly Score Exceeded (Total Inbound Score: 8 - SQLI=0,XSS=0,RFI=0,LFI=0,RCE=0,PHPI=5,HTTP=0,SESS=0): individual paranoia level scores: 8, 0, 0, 0"] [ver "OWASP_CRS/3.3.2"] [tag "event-correlation"] [hostname "198.46.88.63"] [uri "/403.shtml"] [unique_id "YTSNTsqWFjVSrKVZWg_pWwAAAEA"] [Sun Sep 05 05:26:38.041258 2021] [:error] [pid 13332:tid 47640000132864] [client 45.146.164.110:0] [client 45.146.164.110] ModSecurity: Access denied with code 403 (phase 2). Operator GE matched 5 at TX:anomaly_score. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/REQUEST-949-BLOCKING-EVALUATION.conf"] [line "93"] [id "949110"] [msg "Inbound Anomaly Score Exceeded (Total Score: 8)"] [severity "CRITICAL"] [ver "OWASP_CRS/3.3.2"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-generic"] [hostname "198.46.88.63"] [uri "/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php"] [unique_id "YTSNTsqWFjVSrKVZWg_pWwAAAEA"] [Sun Sep 05 05:26:38.040793 2021] [:error] [pid 13332:tid 47640000132864] [client 45.146.164.110:0] [client 45.146.164.110] ModSecurity: Warning. Pattern match "(?:<\\\\?(?:[^x]|x[^m]|xm[^l]|xml[^\\\\s]|xml$|$)|<\\\\?php|\\\\[(?:\\\\/|\\\\\\\\)?php\\\\])" at ARGS_NAMES:
OWASP rule set blocking smtp
Hi, we enabled OWASP ModSecurity Core Rule Set V3.0 yesterday and got people contacting support today saying they could not send email. To get email working again we had to disable rule 949 below: ******* REQUEST-949-BLOCKING-EVALUATION The rules in this configuration file blocks traffic that...
_____________________________
I got confused,
cPanel create Vendor rules will generate errors non-stop on his own log? is not make sense.
or do these errors actually need to appear in the log?
I don't know is not make sense.
Is looking to you normal to get all the errors because of the OWASP rules set? every 5 seconds in the log?
I don't think so, I a little bit wirred.
need guidance guys.
Please help.
Last edited: