![]() |
MySQL Injections In the past, I began to get 500 Internal Server Errors. It was recommended that I disable mod_security via .htaccess. I did and my problems went away. My host recently disabled the ability for us to disable mod_security via .htaccess. So now mod_security was enabled and there is no way to change it. The 500 Internal Server Errors are returning. My host has been kind enough to work with me by adding exceptions for certain pages. E.g. if I were to encounter the error when sending a PM, he would add an exception for /private.php. Well just recently I encountered the error when trying to post a new thread that contains links or images. If I remove the links/images, it works. If I try to edit the post and add the links/images back I get the error again. I e-mailed my host asking if he could add an exception for these pages. It was then discovered that MySQL injections were being used. I am not familiar with this at all so I am not sure if it is normal vBulletin behavior or what. Quote: Ewww…. I wonder why your forum is trying to do a raw MySQL call like the errors at the bottom of this email. I’m not sure what can be done here as this is a pretty basic rule that you’re triggering here. And here are some of the errors from my server log: Quote: [11/Apr/2009:13:22:55 -0500] [lineolatedparakeet.net/sid#8eba118][rid#8a7e110][/forums/newthread.php][1] Access denied with code 500. Pattern match "((select|grant|delete|insert|drop|alter|repla ce|t runcate|update|create|rename|describe)[[:space:]]+[A-Z|a-z|0-9|\\*| |\\,]+[[:space:]]+(from|into|table|database|index|view)[[:space:]]+[A-Z|a-z|0-9|\\*| |\\,]|UNION SELECT.*\\'.*\\'.*,[0-9].*INTO.*FROM)" at POST_PAYLOAD [id "300013"][rev "1"] [msg "Generic SQL injection protection"] [severity "CRITICAL"] [11/Apr/2009:13:22:37 -0500] [lineolatedparakeet.net/sid#8eba118][rid#8a7e110][/forums/ajax.php][1] Access denied with code 500. Pattern match "((select|grant|delete|insert|drop|alter|repla ce|t runcate|update|create|rename|describe)[[:space:]]+[A-Z|a-z|0-9|\\*| |\\,]+[[:space:]]+(from|into|table|database|index|view)[[:space:]]+[A-Z|a-z|0-9|\\*| |\\,]|UNION SELECT.*\\'.*\\'.*,[0-9].*INTO.*FROM)" at POST_PAYLOAD [id "300013"][rev "1"] [msg "Generic SQL injection protection"] [severity "CRITICAL"] [11/Apr/2009:13:21:19 -0500] [lineolatedparakeet.net/sid#8eba118][rid#8a7e110][/forums/editpost.php][1] Access denied with code 500. Pattern match "((select|grant|delete|insert|drop|alter|repla ce|t runcate|update|create|rename|describe)[[:space:]]+[A-Z|a-z|0-9|\\*| |\\,]+[[:space:]]+(from|into|table|database|index|view)[[:space:]]+[A-Z|a-z|0-9|\\*| |\\,]|UNION SELECT.*\\'.*\\'.*,[0-9].*INTO.*FROM)" at POST_PAYLOAD [id "300013"][rev "1"] [msg "Generic SQL injection protection"] [severity "CRITICAL"] Is this normal? Is there any way to 'fix' this? I am at a complete loss as to what to do. Any help is appreciated. |
الساعة الآن 02:36 AM |
Powered by vBulletin® Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
Content Relevant URLs by vBSEO 3.5.2 TranZ By
Almuhajir