[root@atlantis ~]# /scripts/restartsrv_apache --start
Waiting for “httpd” to start ……waiting for “httpd” to initialize ………finished.
Service Status
httpd (/usr/sbin/httpd -k start) is running as root with PID 19950 (systemd+/proc check method).
Startup Log
Oct 23 08:05:46 MyServerHostname.com systemd[1]: Starting Apache web server managed by cPanel EasyApache...
Oct 23 08:05:48 MyServerHostname.com systemd[1]: Can't open PID file /run/apache2/httpd.pid (yet?) after start: No such file or directory
Oct 23 08:05:48 MyServerHostname.com systemd[1]: Started Apache web server managed by cPanel EasyApache.
Log Messages
Oct 23 08:05:48 atlantis systemd: Started Apache web server managed by cPanel EasyApache.
Oct 23 08:05:48 atlantis systemd: Can't open PID file /run/apache2/httpd.pid (yet?) after start: No such file or directory
Oct 23 08:05:46 atlantis systemd: Starting Apache web server managed by cPanel EasyApache...
Oct 23 08:05:39 atlantis systemd: Stopped Apache web server managed by cPanel EasyApache.
Oct 23 08:05:36 atlantis systemd: Stopping Apache web server managed by cPanel EasyApache...
[Fri Oct 23 08:05:48.991819 2020] [mpm_event:notice] [pid 19950:tid 47639635899456] AH00489: Apache/2.4.46 (cPanel) OpenSSL/1.1.1h mod_bwlimited/1.4 configured -- resuming normal operations
[Fri Oct 23 08:05:48.535583 2020] [:notice] [pid 19947:tid 47639635899456] ModSecurity for Apache/2.9.3 (http://www.modsecurity.org/) configured.
[Fri Oct 23 08:04:41.153958 2020] [mpm_event:notice] [pid 3010:tid 47029765264448] AH00489: Apache/2.4.46 (cPanel) OpenSSL/1.1.1h mod_bwlimited/1.4 configured -- resuming normal operations
[Fri Oct 23 08:04:32.486994 2020] [:error] [pid 28304:tid 47030090811136] [client 162.158.79.86:19454] [client 162.158.79.86] ModSecurity: Warning. Operator GE matched 5 at TX:inbound_anomaly_score. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/RESPONSE-980-CORRELATION.conf"] [line "37"] [id "980130"] [msg "Inbound Anomaly Score Exceeded(Total Inbound Score: 5 - SQLI=0,XSS=0,RFI=0,LFI=5,RCE=0,PHPI=0,HTTP=0,SESS=0): Restricted File Access Attempt"] [tag "event-correlation"] [hostname "websitehostname.com"] [uri "/index.php"] [unique_id "X5Jyb@DFhp-6thg0GeudvwAAAQs"]
[Fri Oct 23 08:04:31.118331 2020] [:error] [pid 28304:tid 47030090811136] [client 162.158.79.86:19454] [client 162.158.79.86] ModSecurity: Access denied with code 403 (phase2). Operator GE matched 5 at TX:anomaly_score. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/REQUEST-949-BLOCKING-EVALUATION.conf"] [line "30"] [id "949110"] [msg "Inbound Anomaly Score Exceeded (Total Score: 5)"] [severity "CRITICAL"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-generic"] [hostname "websitehostname.com"] [uri "/.env"] [unique_id "X5Jyb@DFhp-6thg0GeudvwAAAQs"]
[Fri Oct 23 08:04:31.117362 2020] [:error] [pid 28304:tid 47030090811136] [client 162.158.79.86:19454] [client 162.158.79.86] ModSecurity: Warning. Matched phrase "/.env" atREQUEST_FILENAME. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf"] [line "49"] [id "930130"] [rev "1"] [msg "Restricted File Access Attempt"] [data "Matched Data: /.env found within REQUEST_FILENAME: /.env"] [severity "CRITICAL"] [ver "OWASP_CRS/3.0.0"] [maturity "7"] [accuracy "8"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-lfi"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "websitehostname.com"] [uri "/.env"] [unique_id "X5Jyb@DFhp-6thg0GeudvwAAAQs"]
[Fri Oct 23 05:39:17.143852 2020] [:error] [pid 28519:tid 47030172931840] [client 172.69.170.43:20532] [client 172.69.170.43] ModSecurity: Warning. Operator GE matched 5 at TX:inbound_anomaly_score. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/RESPONSE-980-CORRELATION.conf"] [line "37"] [id "980130"] [msg "Inbound Anomaly Score Exceeded(Total Inbound Score: 5 - SQLI=0,XSS=0,RFI=0,LFI=5,RCE=0,PHPI=0,HTTP=0,SESS=0): Restricted File Access Attempt"] [tag "event-correlation"] [hostname "websitehostname.com"] [uri "/403.shtml"] [unique_id "X5JQZZNTYNHqe4aiB9gZugAAAFI"]
[Fri Oct 23 05:39:17.142016 2020] [:error] [pid 28519:tid 47030172931840] [client 172.69.170.43:20532] [client 172.69.170.43] ModSecurity: Access denied with code 403 (phase2). Operator GE matched 5 at TX:anomaly_score. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/REQUEST-949-BLOCKING-EVALUATION.conf"] [line "30"] [id "949110"] [msg "Inbound Anomaly Score Exceeded (Total Score: 5)"] [severity "CRITICAL"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-generic"] [hostname "websitehostname.com"] [uri "/shop/.env"] [unique_id "X5JQZZNTYNHqe4aiB9gZugAAAFI"]
[Fri Oct 23 05:39:17.140199 2020] [:error] [pid 28519:tid 47030172931840] [client 172.69.170.43:20532] [client 172.69.170.43] ModSecurity: Warning. Matched phrase "/.env" atREQUEST_FILENAME. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf"] [line "49"] [id "930130"] [rev "1"] [msg "Restricted File Access Attempt"] [data "Matched Data: /.env found within REQUEST_FILENAME: /shop/.env"] [severity "CRITICAL"] [ver "OWASP_CRS/3.0.0"] [maturity "7"] [accuracy "8"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-lfi"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "websitehostname.com"] [uri "/shop/.env"] [unique_id "X5JQZZNTYNHqe4aiB9gZugAAAFI"]
[Fri Oct 23 05:39:13.217090 2020] [:error] [pid 28304:tid 47030175033088] [client 172.69.170.123:35202] [client 172.69.170.123] ModSecurity: Warning. Operator GE matched 5 at TX:inbound_anomaly_score. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/RESPONSE-980-CORRELATION.conf"] [line "37"] [id "980130"] [msg "Inbound Anomaly Score Exceeded (Total Inbound Score: 5 - SQLI=0,XSS=0,RFI=0,LFI=5,RCE=0,PHPI=0,HTTP=0,SESS=0): Restricted File Access Attempt"] [tag "event-correlation"] [hostname "websitehostname.com"] [uri "/403.shtml"] [unique_id "X5JQYeDFhp-6thg0GeuVBwAAARM"]
[Fri Oct 23 05:39:13.216616 2020] [:error] [pid 28304:tid 47030175033088] [client 172.69.170.123:35202] [client 172.69.170.123] ModSecurity: Access denied with code 403 (phase 2). Operator GE matched 5 at TX:anomaly_score. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/REQUEST-949-BLOCKING-EVALUATION.conf"] [line "30"] [id "949110"] [msg "Inbound Anomaly Score Exceeded (Total Score: 5)"] [severity "CRITICAL"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-generic"] [hostname "websitehostname.com"] [uri "/public/.env"] [unique_id "X5JQYeDFhp-6thg0GeuVBwAAARM"]
[Fri Oct 23 05:39:13.216160 2020] [:error] [pid 28304:tid 47030175033088] [client 172.69.170.123:35202] [client 172.69.170.123] ModSecurity: Warning. Matched phrase "/.env" at REQUEST_FILENAME. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf"] [line "49"] [id "930130"] [rev "1"] [msg "Restricted FileAccess Attempt"] [data "Matched Data: /.env found within REQUEST_FILENAME: /public/.env"] [severity "CRITICAL"] [ver "OWASP_CRS/3.0.0"] [maturity "7"] [accuracy "8"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-lfi"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "websitehostname.com"] [uri "/public/.env"] [unique_id "X5JQYeDFhp-6thg0GeuVBwAAARM"]
[Fri Oct 23 05:39:06.283973 2020] [:error] [pid 28519:tid 47030092912384] [client 172.69.170.43:10058] [client 172.69.170.43] ModSecurity: Warning. Operator GE matched 5 at TX:inbound_anomaly_score. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/RESPONSE-980-CORRELATION.conf"] [line "37"] [id "980130"] [msg "Inbound Anomaly Score Exceeded(Total Inbound Score: 5 - SQLI=0,XSS=0,RFI=0,LFI=5,RCE=0,PHPI=0,HTTP=0,SESS=0): Restricted File Access Attempt"] [tag "event-correlation"] [hostname "websitehostname.com"] [uri "/403.shtml"] [unique_id "X5JQWpNTYNHqe4aiB9gZtAAAAEw"]
[Fri Oct 23 05:39:06.283250 2020] [:error] [pid 28519:tid 47030092912384] [client 172.69.170.43:10058] [client 172.69.170.43] ModSecurity: Access denied with code 403 (phase2). Operator GE matched 5 at TX:anomaly_score. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/REQUEST-949-BLOCKING-EVALUATION.conf"] [line "30"] [id "949110"] [msg "Inbound Anomaly Score Exceeded (Total Score: 5)"] [severity "CRITICAL"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-generic"] [hostname "websitehostname.com"] [uri "/system/.env"] [unique_id "X5JQWpNTYNHqe4aiB9gZtAAAAEw"]
[Fri Oct 23 05:39:06.282644 2020] [:error] [pid 28519:tid 47030092912384] [client 172.69.170.43:10058] [client 172.69.170.43] ModSecurity: Warning. Matched phrase "/.env" atREQUEST_FILENAME. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf"] [line "49"] [id "930130"] [rev "1"] [msg "Restricted File Access Attempt"] [data "Matched Data: /.env found within REQUEST_FILENAME: /system/.env"] [severity "CRITICAL"] [ver "OWASP_CRS/3.0.0"] [maturity "7"] [accuracy "8"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-lfi"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"][hostname "websitehostname.com"] [uri "/system/.env"] [unique_id "X5JQWpNTYNHqe4aiB9gZtAAAAEw"]
[Fri Oct 23 05:39:01.557438 2020] [:error] [pid 28519:tid 47030183438080] [client 172.69.170.67:58732] [client 172.69.170.67] ModSecurity: Warning. Operator GE matched 5 at TX:inbound_anomaly_score. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/RESPONSE-980-CORRELATION.conf"] [line "37"] [id "980130"] [msg "Inbound Anomaly Score Exceeded(Total Inbound Score: 5 - SQLI=0,XSS=0,RFI=0,LFI=5,RCE=0,PHPI=0,HTTP=0,SESS=0): Restricted File Access Attempt"] [tag "event-correlation"] [hostname "websitehostname.com"] [uri "/403.shtml"] [unique_id "X5JQVZNTYNHqe4aiB9gZrgAAAFc"]
[Fri Oct 23 05:39:01.556760 2020] [:error] [pid 28519:tid 47030183438080] [client 172.69.170.67:58732] [client 172.69.170.67] ModSecurity: Access denied with code 403 (phase2). Operator GE matched 5 at TX:anomaly_score. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/REQUEST-949-BLOCKING-EVALUATION.conf"] [line "30"] [id "949110"] [msg "Inbound Anomaly Score Exceeded (Total Score: 5)"] [severity "CRITICAL"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-generic"] [hostname "websitehostname.com"] [uri "/blog/.env"] [unique_id "X5JQVZNTYNHqe4aiB9gZrgAAAFc"]
[Fri Oct 23 05:39:01.556120 2020] [:error] [pid 28519:tid 47030183438080] [client 172.69.170.67:58732] [client 172.69.170.67] ModSecurity: Warning. Matched phrase "/.env" atREQUEST_FILENAME. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf"] [line "49"] [id "930130"] [rev "1"] [msg "Restricted File Access Attempt"] [data "Matched Data: /.env found within REQUEST_FILENAME: /blog/.env"] [severity "CRITICAL"] [ver "OWASP_CRS/3.0.0"] [maturity "7"] [accuracy "8"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-lfi"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "websitehostname.com"] [uri "/blog/.env"] [unique_id "X5JQVZNTYNHqe4aiB9gZrgAAAFc"]
[Fri Oct 23 05:38:54.922115 2020] [:error] [pid 28261:tid 47030177134336] [client 172.69.170.97:14440] [client 172.69.170.97] ModSecurity: Warning. Operator GE matched 5 at TX:inbound_anomaly_score. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/RESPONSE-980-CORRELATION.conf"] [line "37"] [id "980130"] [msg "Inbound Anomaly Score Exceeded(Total Inbound Score: 5 - SQLI=0,XSS=0,RFI=0,LFI=5,RCE=0,PHPI=0,HTTP=0,SESS=0): Restricted File Access Attempt"] [tag "event-correlation"] [hostname "websitehostname.com"] [uri "/403.shtml"] [unique_id "X5JQTl37ZSj3xEMOrgsssQAAANQ"]
[Fri Oct 23 05:38:54.921543 2020] [:error] [pid 28261:tid 47030177134336] [client 172.69.170.97:14440] [client 172.69.170.97] ModSecurity: Access denied with code 403 (phase2). Operator GE matched 5 at TX:anomaly_score. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/REQUEST-949-BLOCKING-EVALUATION.conf"] [line "30"] [id "949110"] [msg "Inbound Anomaly Score Exceeded (Total Score: 5)"] [severity "CRITICAL"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-generic"] [hostname "websitehostname.com"] [uri "/sites/.env"] [unique_id "X5JQTl37ZSj3xEMOrgsssQAAANQ"]
[Fri Oct 23 05:38:54.921144 2020] [:error] [pid 28261:tid 47030177134336] [client 172.69.170.97:14440] [client 172.69.170.97] ModSecurity: Warning. Matched phrase "/.env" atREQUEST_FILENAME. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf"] [line "49"] [id "930130"] [rev "1"] [msg "Restricted File Access Attempt"] [data "Matched Data: /.env found within REQUEST_FILENAME: /sites/.env"] [severity "CRITICAL"] [ver "OWASP_CRS/3.0.0"] [maturity "7"] [accuracy "8"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-lfi"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "websitehostname.com"] [uri "/sites/.env"] [unique_id "X5JQTl37ZSj3xEMOrgsssQAAANQ"]
[Fri Oct 23 05:38:50.138391 2020] [:error] [pid 28519:tid 47030170830592] [client 172.69.170.97:9824] [client 172.69.170.97] ModSecurity: Warning. Operator GE matched 5 at TX:inbound_anomaly_score. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/RESPONSE-980-CORRELATION.conf"] [line "37"] [id "980130"] [msg "Inbound Anomaly Score Exceeded (Total Inbound Score: 5 - SQLI=0,XSS=0,RFI=0,LFI=5,RCE=0,PHPI=0,HTTP=0,SESS=0): Restricted File Access Attempt"] [tag "event-correlation"] [hostname "websitehostname.com"] [uri "/403.shtml"] [unique_id "X5JQSpNTYNHqe4aiB9gZqwAAAFE"]
[Fri Oct 23 05:38:50.137841 2020] [:error] [pid 28519:tid 47030170830592] [client 172.69.170.97:9824] [client 172.69.170.97] ModSecurity: Access denied with code 403 (phase 2). Operator GE matched 5 at TX:anomaly_score. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/REQUEST-949-BLOCKING-EVALUATION.conf"] [line "30"] [id "949110"] [msg "Inbound Anomaly Score Exceeded (Total Score: 5)"] [severity "CRITICAL"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-generic"] [hostname "websitehostname.com"] [uri "/vendor/.env"] [unique_id "X5JQSpNTYNHqe4aiB9gZqwAAAFE"]
[Fri Oct 23 05:38:50.136859 2020] [:error] [pid 28519:tid 47030170830592] [client 172.69.170.97:9824] [client 172.69.170.97] ModSecurity: Warning. Matched phrase "/.env" at REQUEST_FILENAME. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf"] [line "49"] [id "930130"] [rev "1"] [msg "Restricted File Access Attempt"] [data "Matched Data: /.env found within REQUEST_FILENAME: /vendor/.env"] [severity "CRITICAL"] [ver "OWASP_CRS/3.0.0"] [maturity "7"] [accuracy "8"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-lfi"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "websitehostname.com"] [uri "/vendor/.env"] [unique_id "X5JQSpNTYNHqe4aiB9gZqwAAAFE"]
[Fri Oct 23 05:38:44.312762 2020] [:error] [pid 28519:tid 47030074001152] [client 172.69.170.123:56270] [client 172.69.170.123] ModSecurity: Warning. Operator GE matched 5 at TX:inbound_anomaly_score. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/RESPONSE-980-CORRELATION.conf"] [line "37"] [id "980130"] [msg "Inbound Anomaly Score Exceeded (Total Inbound Score: 5 - SQLI=0,XSS=0,RFI=0,LFI=5,RCE=0,PHPI=0,HTTP=0,SESS=0): Restricted File Access Attempt"] [tag "event-correlation"] [hostname "websitehostname.com"] [uri "/403.shtml"] [unique_id "X5JQRJNTYNHqe4aiB9gZpwAAAEM"]
[Fri Oct 23 05:38:44.312217 2020] [:error] [pid 28519:tid 47030074001152] [client 172.69.170.123:56270] [client 172.69.170.123] ModSecurity: Access denied with code 403 (phase 2). Operator GE matched 5 at TX:anomaly_score. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/REQUEST-949-BLOCKING-EVALUATION.conf"] [line "30"] [id "949110"] [msg "Inbound Anomaly Score Exceeded (Total Score: 5)"] [severity "CRITICAL"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-generic"] [hostname "websitehostname.com"] [uri "/admin/.env"] [unique_id "X5JQRJNTYNHqe4aiB9gZpwAAAEM"]
[Fri Oct 23 05:38:44.311641 2020] [:error] [pid 28519:tid 47030074001152] [client 172.69.170.123:56270] [client 172.69.170.123] ModSecurity: Warning. Matched phrase "/.env" at REQUEST_FILENAME. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf"] [line "49"] [id "930130"] [rev "1"] [msg "Restricted FileAccess Attempt"] [data "Matched Data: /.env found within REQUEST_FILENAME: /admin/.env"] [severity "CRITICAL"] [ver "OWASP_CRS/3.0.0"] [maturity "7"] [accuracy "8"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-lfi"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "websitehostname.com"] [uri "/admin/.env"] [unique_id "X5JQRJNTYNHqe4aiB9gZpwAAAEM"]
[Fri Oct 23 05:38:40.768196 2020] [:error] [pid 28519:tid 47030162425600] [client 172.69.170.123:56270] [client 172.69.170.123] ModSecurity: Warning. Operator GE matched 5 at TX:inbound_anomaly_score. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/RESPONSE-980-CORRELATION.conf"] [line "37"] [id "980130"] [msg "Inbound Anomaly Score Exceeded (Total Inbound Score: 5 - SQLI=0,XSS=0,RFI=0,LFI=5,RCE=0,PHPI=0,HTTP=0,SESS=0): Restricted File Access Attempt"] [tag "event-correlation"] [hostname "websitehostname.com"] [uri "/403.shtml"] [unique_id "X5JQQJNTYNHqe4aiB9gZpgAAAE0"]
[Fri Oct 23 05:38:40.767715 2020] [:error] [pid 28519:tid 47030162425600] [client 172.69.170.123:56270] [client 172.69.170.123] ModSecurity: Access denied with code 403 (phase 2). Operator GE matched 5 at TX:anomaly_score. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/REQUEST-949-BLOCKING-EVALUATION.conf"] [line "30"] [id "949110"] [msg "Inbound Anomaly Score Exceeded (Total Score: 5)"] [severity "CRITICAL"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-generic"] [hostname "websitehostname.com"] [uri "/test/.env"] [unique_id "X5JQQJNTYNHqe4aiB9gZpgAAAE0"]
[Fri Oct 23 05:38:40.767295 2020] [:error] [pid 28519:tid 47030162425600] [client 172.69.170.123:56270] [client 172.69.170.123] ModSecurity: Warning. Matched phrase "/.env" at REQUEST_FILENAME. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf"] [line "49"] [id "930130"] [rev "1"] [msg "Restricted FileAccess Attempt"] [data "Matched Data: /.env found within REQUEST_FILENAME: /test/.env"] [severity "CRITICAL"] [ver "OWASP_CRS/3.0.0"] [maturity "7"] [accuracy "8"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-lfi"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"][hostname "websitehostname.com"] [uri "/test/.env"] [unique_id "X5JQQJNTYNHqe4aiB9gZpgAAAE0"]
[Fri Oct 23 05:38:32.567022 2020] [:error] [pid 28304:tid 47030092912384] [client 172.69.170.68:47328] [client 172.69.170.68] ModSecurity: Warning. Operator GE matched 5 at TX:inbound_anomaly_score. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/RESPONSE-980-CORRELATION.conf"] [line "37"] [id "980130"] [msg "Inbound Anomaly Score Exceeded(Total Inbound Score: 5 - SQLI=0,XSS=0,RFI=0,LFI=5,RCE=0,PHPI=0,HTTP=0,SESS=0): Restricted File Access Attempt"] [tag "event-correlation"] [hostname "websitehostname.com"] [uri "/403.shtml"] [unique_id "X5JQOODFhp-6thg0GeuU8wABDA0"]
[Fri Oct 23 05:38:32.530017 2020] [:error] [pid 28304:tid 47030036178688] [client 172.69.170.68:47328] [client 172.69.170.68] ModSecurity: Access denied with code 403 (phase2). Operator GE matched 5 at TX:anomaly_score. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/REQUEST-949-BLOCKING-EVALUATION.conf"] [line "30"] [id "949110"] [msg "Inbound Anomaly Score Exceeded (Total Score: 5)"] [severity "CRITICAL"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-generic"] [hostname "websitehostname.com"] [uri "/laravel/.env"] [unique_id "X5JQOODFhp-6thg0GeuU8wABDA0"]
[Fri Oct 23 05:38:32.509057 2020] [:error] [pid 28304:tid 47030036178688] [client 172.69.170.68:47328] [client 172.69.170.68] ModSecurity: Warning. Matched phrase "/.env" atREQUEST_FILENAME. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf"] [line "49"] [id "930130"] [rev "1"] [msg "Restricted File Access Attempt"] [data "Matched Data: /.env found within REQUEST_FILENAME: /laravel/.env"] [severity "CRITICAL"] [ver "OWASP_CRS/3.0.0"] [maturity "7"] [accuracy "8"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-lfi"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "websitehostname.com"] [uri "/laravel/.env"] [unique_id "X5JQOODFhp-6thg0GeuU8wABDA0"]
[Fri Oct 23 05:38:28.905184 2020] [:error] [pid 28519:tid 47030092912384] [client 172.69.170.67:63822] [client 172.69.170.67] ModSecurity: Warning. Operator GE matched 5 at TX:inbound_anomaly_score. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/RESPONSE-980-CORRELATION.conf"] [line "37"] [id "980130"] [msg "Inbound Anomaly Score Exceeded(Total Inbound Score: 5 - SQLI=0,XSS=0,RFI=0,LFI=5,RCE=0,PHPI=0,HTTP=0,SESS=0): Restricted File Access Attempt"] [tag "event-correlation"] [hostname "websitehostname.com"] [uri "/403.shtml"] [unique_id "X5JQNJNTYNHqe4aiB9gZoQAAAEw"]
[Fri Oct 23 05:38:28.904631 2020] [:error] [pid 28519:tid 47030092912384] [client 172.69.170.67:63822] [client 172.69.170.67] ModSecurity: Access denied with code 403 (phase2). Operator GE matched 5 at TX:anomaly_score. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/REQUEST-949-BLOCKING-EVALUATION.conf"] [line "30"] [id "949110"] [msg "Inbound Anomaly Score Exceeded (Total Score: 5)"] [severity "CRITICAL"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-generic"] [hostname "websitehostname.com"] [uri "/api/.env"] [unique_id "X5JQNJNTYNHqe4aiB9gZoQAAAEw"]
[Fri Oct 23 05:38:28.904023 2020] [:error] [pid 28519:tid 47030092912384] [client 172.69.170.67:63822] [client 172.69.170.67] ModSecurity: Warning. Matched phrase "/.env" atREQUEST_FILENAME. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf"] [line "49"] [id "930130"] [rev "1"] [msg "Restricted File Access Attempt"] [data "Matched Data: /.env found within REQUEST_FILENAME: /api/.env"] [severity "CRITICAL"] [ver "OWASP_CRS/3.0.0"] [maturity "7"] [accuracy "8"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-lfi"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "websitehostname.com"] [uri "/api/.env"] [unique_id "X5JQNJNTYNHqe4aiB9gZoQAAAEw"]
[Fri Oct 23 05:38:25.617594 2020] [:error] [pid 28260:tid 47030185539328] [client 172.69.170.123:40130] [client 172.69.170.123] ModSecurity: Warning. Operator GE matched 5 at TX:inbound_anomaly_score. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/RESPONSE-980-CORRELATION.conf"] [line "37"] [id "980130"] [msg "Inbound Anomaly Score Exceeded (Total Inbound Score: 5 - SQLI=0,XSS=0,RFI=0,LFI=5,RCE=0,PHPI=0,HTTP=0,SESS=0): Restricted File Access Attempt"] [tag "event-correlation"] [hostname "websitehostname.com"] [uri "/403.shtml"] [unique_id "X5JQMVGO2qsbPOK0Ios0KAAAAJg"]
[Fri Oct 23 05:38:25.616952 2020] [:error] [pid 28260:tid 47030185539328] [client 172.69.170.123:40130] [client 172.69.170.123] ModSecurity: Access denied with code 403 (phase 2). Operator GE matched 5 at TX:anomaly_score. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/REQUEST-949-BLOCKING-EVALUATION.conf"] [line "30"] [id "949110"] [msg "Inbound Anomaly Score Exceeded (Total Score: 5)"] [severity "CRITICAL"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-generic"] [hostname "websitehostname.com"] [uri "/.env"] [unique_id "X5JQMVGO2qsbPOK0Ios0KAAAAJg"]
httpd started successfully.