If this is your first visit, be sure to
check out the FAQ by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.
Announcement
Collapse
No announcement yet.
IM360 WAF: Request body parsing error - Blocking IP after uploading Wordpress content
IM360 WAF: Request body parsing error - Blocking IP after uploading Wordpress content
after installing IM360 and even I have my IP whitelisted, the system, after uploading images, content or what ever, it blocks my IP for a while. I've followed the documentation for checking that my IP is in the whitelist through command line, and everything seems ok but I keep being blocked everytime with this messages:
Would love some help please.
I hope you are doing well. Thank you for letting the forum know about your experience with IM360 product.
Generally, The reported error means that the ModSecurity was installed without its' JSON support.
Proceeding with the installation of it and inserting, afterwards, the corresponding reference to the configuration file would be a good idea.
For Ubuntu systems
We can first confirm the absence of the package by running
Code:
apt list --installed|grep yajl
. If it's not there then you can proceed by executing
Code:
apt-get install yajl*
For RedHat based systems
We can first confirm the absence of the package by running
Code:
rpm -qa | grep yajl
. If it's not there then you can proceed by executing
Code:
sudo dnf -y install yajl
Upon the completion of the installation of the package you have to ensure that the line
Code:
SecAuditLogFormat JSON
is included into the modsecurity configuration file. However, without knowing your stack - I can not be certain where this file is located in your system. Nonetheless, feel free to use
Code:
for file in `find /etc -iname "modsec*conf" -type f`;do grep "SecAuditLogFormat" $file;done
which it takes for granted that the conf file is located under /etc of your system and returns the output of SecAuditLogFormat existence or not.
That been said the procedure of change should look like this,
Edit the file /etc/httpd/conf.d/modsec2.imunify.conf, find the SecAuditLogFormat directive in it and adjust it accordingly:
Code:
SecAuditLogFormat JSON
After the completion of the edit you can ensure the integrity of your new configuration by executing
Code:
apachectl -t
In case of PLESK - In certain cases re-installation
Last but not least. Kindly be advised that in case of using NGINX , according to this , such an option can not be supported unless we are talking about a stand-alone installation.
We process personal data about users of our site, through the use of cookies and other technologies, to deliver our services, personalize advertising, and to analyze site activity. We may share certain information about our users with our advertising and analytics partners. For additional details, refer to our Privacy Policy.
By clicking "I AGREE" below, you agree to our Privacy Policy and our personal data processing and cookie practices as described therein. You also acknowledge that this forum may be hosted outside your country and you consent to the collection, storage, and processing of your data in the country where this forum is hosted.
Comment