Files being 403 Forbidden'd, possibly due to its extension?

Status
Not open for further replies.

doqkx10m

New Member
Messages
6
Reaction score
0
Points
1

caftpx10

Well-Known Member
Messages
1,534
Reaction score
114
Points
63
Mod_security2 is not only limited to GNU/Linux but also works on Windows.
It seems to be blocked to avoid execution if it were to be hosted on a Windows system (even though the server being used isn't).
Also, this pattern block is based on detecting '.cmd' in the path so it doesn't have to exist to throw out a 403.
 

bdistler

Well-Known Member
Prime Account
Messages
3,534
Reaction score
196
Points
63
What gives?
mod_security settings will throw a 404 error if it sees a "leaky" response and a 403 error if it sees a "shady" request

you'll get either a 403, a 404 or an empty response instead, depending on the apparent severity
 

caftpx10

Well-Known Member
Messages
1,534
Reaction score
114
Points
63
What you could do about this is rename the files to have a different file extension (note that .bak also causes 403) or place it in an archive.
 

doqkx10m

New Member
Messages
6
Reaction score
0
Points
1
Ok... so I'm trying to wget those files so they would have to be directly linked anyway.

Any way to fix this in a setting or something?
 

bdistler

Well-Known Member
Prime Account
Messages
3,534
Reaction score
196
Points
63
Any way to fix this in a setting or something?
Mod_Security is a Web Application Firewall (WAF) that filters and blocks known malicious HTTP requests. Blocked HTTP requests include many, but not all forms of Brute Force, Cross-Site Scripting (XSS), Remote File Inclusion (RFI) , Remote Execution, and SQL injection (SQLi) attacks.

while x10hosting discourage it - Premium account users have the ability to completely disable [ mod_security ] on their account via cPanel

For free-hosting accounts - x10hosting has a customized web server setup that does not allow for the same cPanel functionality to disable all or part of [ mod_security ] - x10hosting also decided it would not be a good idea to allow free-hosting users to disable any of it - as it is used to not only protect against inbound malicious attacks but to prevent outbound abuse also - Unfortunately free-hosting still gets abusive signups - and allowing those abusive users to disable something that helps to prevent their malicious actions would not be in x10hosting's best interest
 

caftpx10

Well-Known Member
Messages
1,534
Reaction score
114
Points
63
Unless the X10hosting servers (GNU/Linux) has something like Wine installed for some reason, this rule shouldn't be enabled as it does not pose any security risk.
 

doqkx10m

New Member
Messages
6
Reaction score
0
Points
1
while x10hosting discourage it - Premium account users have the ability to completely disable [ mod_security ] on their account via cPanel
Right...

So in essence I buy their already overpriced premium hosting service or I seek hosting elsewhere.
mmk thanks :)
 

bdistler

Well-Known Member
Prime Account
Messages
3,534
Reaction score
196
Points
63
...as it does not pose any security risk.
[ mod_security ] is used to not only protect against inbound malicious attacks but also to prevent outbound (from x10hosting) malicious attacks
 
Last edited:

caftpx10

Well-Known Member
Messages
1,534
Reaction score
114
Points
63
[ mod_security ] is used to not only protect against inbound malicious attacks but also to prevent outbound (from x10hosting) malicious attacks
Note that this is a URL pattern check. This isn't to do with detection of something like cURL (in a PHP script) requesting one.
 

Dead-i

x10Hosting Support Ninja
Community Support
Messages
6,084
Reaction score
368
Points
83
Right...

So in essence I buy their already overpriced premium hosting service or I seek hosting elsewhere.
mmk thanks :)
Hi doqkx10m,

Sorry to hear you're having problems with this. The purpose of using mod_security on our servers is to protect our free hosting customers from common website attacks, and we would never use it to upsell premium hosting to you. Since our service is completely free, I'm sure you understand that we do get many users that create an account and install vulnerable, outdated software/plugins on their hosting account, making their website vulnerable and our servers vulnerable. Mod Security helps to prevent this.

I took a quick look at the server error logs, and it looks like files with the "cmd" extension are being blocked to prevent RFD attacks. While sometimes I'm able to disable mod_security rules for individual users if they are wrongly hitting a rule, this rule in particular is in place to prevent a common web attack, and this isn't something I would want to disable. Please consider using a different file extension (plus, distributing bat/cmd files usually isn't a good idea anyway). ;)

Please let me know if you have any further questions.

Thank you,
 
Status
Not open for further replies.
Top