[wp-trac] [WordPress Trac] #45190: Blank screen for WP 5.0 beta on a web host with a Mod_Security conflict

WordPress Trac noreply at wordpress.org
Sun Oct 28 19:23:51 UTC 2018


#45190: Blank screen for WP 5.0 beta on a web host with a Mod_Security conflict
--------------------------+---------------------
 Reporter:  designsimply  |       Owner:  (none)
     Type:  defect (bug)  |      Status:  new
 Priority:  normal        |   Milestone:  5.0
Component:  Editor        |     Version:
 Severity:  normal        |  Resolution:
 Keywords:  dev-feedback  |     Focuses:
--------------------------+---------------------

Comment (by Clorith):

 There is an existing issue logged for this at
 https://github.com/WordPress/gutenberg/issues/10075

 I'll just fill out with some other mod_sec rules we've observed for
 maximum coverage:

 {{{
 ModSecurity: Access denied with code 403 (phase 2). Match of "within
 %{tx.allowed_request_content_type}" against "TX:0" required. [file
 "/usr/local/apache2/conf/modsecurity/base_rules/modsecurity_crs_30_http_policy.conf"]
 [line "63"] [id "960010"] [msg "Request content type is not allowed by
 policy"] [data "application/json"] [severity "WARNING"] [tag
 "POLICY/ENCODING_NOT_ALLOWED"] [tag "WASCTC/WASC-20"] [tag
 "OWASP_TOP_10/A1"] [tag "OWASP_AppSensor/EE2"] [tag "PCI/12.1"] [hostname
 "www.domain.com"] [uri "/wp-json/wp/v2/posts/6/autosaves"] [unique_id
 "W3dK9goASzoAABfURiAAAAA-"]
 }}}

 {{{
 ModSecurity: [file
 "/etc/httpd/conf/modsecurity.d/rules/tortix/modsec/50_plesk_basic_asl_rules.conf"]
 [line "301"] [id "340149"] [rev "152"] [msg "Protected by Atomicorp.com
 Basic Non-Realtime WAF Rules: Potential Cross Site Scripting Attack"]
 [data "ecmascript"] [severity "CRITICAL"] Access denied with code 403
 (phase 2). Pattern match "(?:< ?i?frame ?src ?=
 ?(?:ogg|gopher|data|php|zlib|(?:ht|f)tps?):/|(?:\\\\.add|\\\\@)import
 |asfunction\\\\:|background-
 image\\\\:|e(?:cma|xec)script|\\\\.fromcharcode|get(?:parentfolder|specialfolder)|\\\\.innerhtml|\\\\<
 ?input|(?:/|<) ?(?:java|live|j|vb)script!s| ..." at REQUEST_URI. [hostname
 "dev.partzorg.nl"] [uri "/wp-content/plugins/gutenberg/vendor/wp-polyfill-
 ecmascript.min.2ae96136.js"] [unique_id "W59N9ACZ95d3fNdTxLlY8gAAAAY"],
 referer: http://dev.partzorg.nl/wp-admin/post.php?post=407&action=edit
 }}}

 {{{
 ModSecurity: Access denied with code 403 (phase 2). Match of "ge 1"
 against "&REQUEST_COOKIES_NAMES:/^wordpress_([0-9a-fA-f]{32})$/" required.
 [file "/usr/local/cwaf/rules/28_Apps_WordPress.conf"] [line "127"] [id
 "225170"] [rev "1"] [msg "COMODO WAF: Sensitive Information Disclosure
 Vulnerability in WordPress 4.7 (CVE-2017-5487)||my-domain-name|F|2"]
 [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "my-domain-
 name"] [uri "/wp-json/wp/v2/users"] [unique_id
 "WqDSpFczAjtKrcDim5CqlAAAAGA"], referer: http://my-domain-name/wp-admin
 /post-new.php?post_type=page
 }}}

 Those were the three I could recall the topics for, I don't know specific
 hosts, but I'm seeing one default plesk rule at least.

-- 
Ticket URL: <https://core.trac.wordpress.org/ticket/45190#comment:3>
WordPress Trac <https://core.trac.wordpress.org/>
WordPress publishing platform


More information about the wp-trac mailing list