- Posts: 17
- Thank you received: 0
<iframe marginwidth="0" marginheight="0" scrolling="no" frameborder="0" src="//ws-na.amazon-adsystem.com/widgets/q?ServiceVersion=20070822&OneJS=1&Operation=GetAdHtml&MarketPlace=US&source=ss&ref=as_ss_li_til&ad_type=product_link&tracking_id=core-20&language=en_US&marketplace=amazon&region=US&placement=B072KG85RN&asins=B072KG85RN&linkId=bc978d2cdefb5daa0043e1a218e62022&show_border=false&link_opens_in_new_window=true" style="width: 120px; height: 240px;"></iframe>
The webmaster has forbidden your access to this site
Tags stripped from string (possible XSS attack) :[POST:jform]
The server encountered an internal error or misconfiguration and was unable to complete your request.
More information about this error may be available in the server error log.
[Thu Jul 11 08:42:36 2019] [error] [client 2601:19f:901:a2a3:90cf:54e:d5e1:1d1f] ModSecurity: Access denied with code 418 (phase 2). Matched phrase "base64_decode" at ARGS:second_level_words. [line "256"] [id "1990070"] [msg "Common known arguments for backdoor shell present in ARGS:second_level_words"] [hostname "xxxxxxxxxxxxxxx.com"] [uri "/administrator/index.php"] [unique_id "XSdY7dWjwHTAAAmNc3MAbAAK"][/quote] To avoid this problem, is there a way for me to change the filter exceptions rule manually in the SCP database or files? In the meantime, I just turned off firewall protection while publishing the article.[file "/dh/apache2/template/etc/mod_sec2/99_dreamhost_rules.conf"] [line "256"] [id "1990070"] [msg "Common known arguments for backdoor shell present in ARGS:second_level_words"] [hostname "xxxxxxxxxxxxxxx.com"] [uri "/administrator/index.php"] [unique_id "XSdY7dWjwHTAAAmNc3MAbAAK"]