afiori Posted April 18, 2016 Share Posted April 18, 2016 I installed a prestashop 1.6.1.4. The website is not online now but the log has many security errors. The log is in the file attachment. Thanks for a little help logaruba.pdf Link to comment Share on other sites More sharing options...
musicmaster Posted April 18, 2016 Share Posted April 18, 2016 It is better to put the important section here so that everyone can read it: ModSecurity: Warning. Match of "within %{tx.allowed_methods}" against "REQUEST_METHOD" required. [file "/modsecurity/modsecurity_crs_30_http_policy.conf"] [line "31"] [id "960032"] [rev "2"] [msg "Method is not allowed by policy"] [data "GET"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/POLICY/METHOD_NOT_ALLOWED"] [tag "WASCTC/WASC-15"] [tag "OWASP_TOP_10/A6"] [tag "OWASP_AppSensor/RE1"] [tag "PCI/12.1"] [hostname "www.farmacia10elode.it"] [uri "/shop/img/tmp/product_mini_900190190_1.jpg"] [unique_id "VxR0KFkuaf0AAI2DsRQAAAAE"], referer http://www.farmacia10elode.it/shop/admin/index.php? controller=AdminProducts&token=6dc49996c70b0ac1e4a2683c257f8a10Mon, 18 Apr 2016 07:44:08 GMT [error] - www.farmacia10elode.it - [client 87.0.226.240] ModSecurity: Warning. Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\ %\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\ [\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:PrestaShop-aaaa910447cc64af1539e7267fe89e20. [file "/modsecurity/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: + found within REQUEST_COOKIES:PrestaShop-aaaa910447cc64af1539e7267fe89e20: kQJl5Cvo+cJOIsbZ/6ZL5X7gvr+oE75dY84VErem2AGBjK777777777WfXqm0Ia1Jm0qdAXo6b3dRbPA+yAicN/u2+pkGAXShjCQgGsdFr50F L+xmDdQnqZQwX3O85EZSz+48QGs5M+JTnM03hznF+rHkSztY3VDGQJzFh6UBIMPkpr3nbP8Tm6OT5IzhBsleUQHBPQzpbbxSi7ASPlfXQkP mJQs0hpzOzf7eP+YrDl7XtyUlYc3HsGPUKYwCua62kvyZHa99Ht9/egK7YkDb8tzTnGjjggSUK6nzUJAWk4=000216"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "www.farmacia10elode.it"] [uri "/shop/img/tmp/product_mini_900190190_1.jpg"] [unique_id "VxR0KFkuaf0AAI2DsRQAAAAE"], referer http://www.farmacia10elode.it/shop/admin/index.php? controller=AdminProducts&token=6dc49996c70b0ac1e4a2683c257f8a10 I have also made some security improvements. I advise you to remove the pdf. As I have no experience with Owasp I can't help you with the details. Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now