Book Mark

Ike.ninja

Linux Fun
  • Home
  • How to
  • Reference Links
  • Categories
    • Releases
    • Plesk
    • Community
    • CMS
    • security
    • MYSQL
    • cPanel
  • Tools
    • IP Checker
    • Byte Converter
RSS

Ubuntu: 1680-1: MoinMoin vulnerabilities

Dec31
by Ike on December 31, 2012 at 7:17 pm
Posted In: Other

(Dec 29) MoinMoin could be made to run programs and overwrite files.

 Comment 

Debian: 2590-1: wireshark: Multiple vulnerabilities

Dec29
by Ike on December 29, 2012 at 7:56 pm
Posted In: Other

(Dec 26) Bjorn Mork and Laurent Butti discovered crashes in the PPP and RTPS2 dissectors, which could potentially result in the execution of arbitrary code. [More…]

└ Tags: code, PPP
 Comment 

Debian: 2592-1: elinks: programming error

Dec28
by Ike on December 28, 2012 at 7:23 pm
Posted In: Other

(Dec 27) Marko Myllynen discovered that elinks, a powerful text-mode browser, incorrectly delegates user credentials during GSS-Negotiate. For the stable distribution (squeeze), this problem has been fixed in [More…]

└ Tags: Marko Myllynen
 Comment 

Debian: 2591-1: mahara: Multiple vulnerabilities

Dec28
by Ike on December 28, 2012 at 7:07 pm
Posted In: Other

(Dec 27) Multiple security issues have been found in Mahara – an electronic portfolio, weblog, and resume builder -, which can result in cross-site scripting, clickjacking or arbitrary file execution. [More…]

└ Tags: site
 Comment 

ModSecurity Changes

Dec28
by Ike on December 28, 2012 at 9:57 am
Posted In: Community, cPanel, easyapache, Hosting, ModSecurity, News, security

cPanel recently released EasyApache 3.16. This version of EasyApache contains an updated version of ModSecurity that has an important change to Rule IDs which will affect you.

In addition to the RuleID change, another change in ModSecurity that affects directive names will be incorporated into EasyApache 3.18.

Unique Rule IDs are mandatory

Unique Rule IDs are mandatory. When EasyApache runs, it tries to automatically assign unique Rule IDs to any existing rules that do not already have Rule IDs. However, you will need to manually check your ruleset to confirm that there are no Rule ID conflicts or syntactical errors.

Also, if you automatically download and import rulesets into your ModSecurity on a schedule, EasyApache will not check these rules for Rule ID conflicts or syntactical errors. If the third-party ruleset contains Rule ID conflicts or syntactical errors, ModSecurity will fail and Apache will not start.

The following is an example of a rule that does not contain a Rule ID:

 SecRule REMOTE_ADDR "^127.0.0.1$" "nolog,allow"
SecAction "phase:2,pass,nolog"

You will see an error similar to the following:

 1. Critical Error: No Rule ID Syntax error on line XX of /some/config/file.conf: ModSecurity: No action id present within the rule

The following is the same rule that has been changed to include a unique Rule ID:

 SecRule REMOTE_ADDR "^127.0.0.1$" "nolog,allow,id:1234123455"
SecAction "phase:2,pass,nolog,id:1234123456"

However, if the Rule ID duplicates another Rule ID, you will see:

 2. Critical Error: Duplicate Rule ID: Syntax error on line XX of /some/config/file.conf: ModSecurity: Found another rule with the same id

Configuration directive changes

Six configuration directives have been changed to use the word “Hash” instead of “Encryption” and they are not backwards-compatible.

EasyApache will try to convert all references within your existing ruleset from “Hash” into “Encryption.” However, if you automatically download and import rulesets into your ModSecurity on a schedule, EasyApache will not check these rules for the deprecated term “Encryption.” ModSecurity does not support the deprecated term “Encryption” and it will fail, which will make Apache fail to start.

The following is an example of a rule that used the deprecated term “Encryption”

# Validates requested URI that matches a regular expression.
SecRule REQUEST_URI "@validateEncryption product_info|product_list" "phase:1,deny,id:123456"

You will see an error similar to the following

Syntax error on line XX of /usr/local/apache/conf/modsec2.conf:
Invalid command '@validateEncryption', perhaps misspelled or defined by a module not included in the server configuration

The following is an example of the example rule that has been changed to use the new term “Hash”

# Validates requested URI that matches a regular expression.
SecRule REQUEST_URI "@validateHash product_info|product_list" "phase:1,deny,id:123456"

——-

These two changes are important because if you have any rules which ModSecurity cannot process, ModSecurity will fail and Apache will not start. This is a change from ModSecurity’s previous behavior, which was to fail with a warning, but allow Apache to start successfully.

For more information, read the ModSecurity Page.

└ Tags: easyapache, ModSecurity, news, security
 Comment 
  • Page 2,759 of 2,977
  • « First
  • «
  • 2,757
  • 2,758
  • 2,759
  • 2,760
  • 2,761
  • »
  • Last »

What’s New?

  • Fedora 42: usd 2025-447047dda8 OpenEXRCore Memory Issue CVE-2025-64181
  • Fedora 42: python3.14 Critical Update Advisory 2025-d5dffbf048
  • Ubuntu 18.04 LTS USN-7937-1 Linux-azure-fips Critical Threat
  • Ubuntu 24.04: Linux Kernel Critical Security Flaws USN-7936-1
  • Fedora 43: Firefox Update 2025-f20b9f321d – Aarch64 Crashes Fixed
  • Chromium Medium Problems in Password Manager and Toolbar for Fedora 42
  • Debian: vlc Critical Denial of Service and Code Execution DSA-6082-1
  • Debian: Thunderbird Critical Arbitrary Code Exec DSA-6081-1 CVE-2025-14321
  • Fedora 41: Apptainer CVE-2025-65105 Security Fix Advisory
  • Fedora 43: Apptainer 1.4.5 Important Fix CVE-2025-65105
  • Ubuntu 18.04: USN-7907-5 Linux Kernel Important Security Flaws
  • Debian: Chromium Important DSA-6080-1 Code Exec DoS Issues
  • Fedora 42: SingularityCE Important Upgrade 4.3.5 – FEDORA-2025-54d78b9fed
  • Fedora 43: perl-Alien-Brotli Critical Security DoS Fix 2025-d93200cf16
  • Fedora 42: Wireshark 4.6.1 Critical Issue Advisory – FEDORA-2025-f810869906
  • Fedora 42: yarnpkg Command Injection Fix CVE-2025-64756 Advisory
  • Ubuntu 25.10: Linux Kernel Critical Flaws Security Patch USN-7906-3
  • Ubuntu 22.04: USN-7889-6 Linux Kernel Important Security Patch
  • Ubuntu 22.04 LTS: Linux Kernel Critical Security Issues USN-7928-3
  • Ubuntu 22.04: 7928-2 Linux Kernel FIPS Security Updates
  • Ubuntu 22.04 LTS: USN-7928-1 Linux Kernel Critical Security Issues
  • Significant Vulnerabilities in OpenStack Keystone on Ubuntu 22.04 LTS
  • Ubuntu 24.04 LTS: urllib3 Important DoS Vulnerabilities USN-7927-1
  • Debian: Important DoS Vulnerabilities in FFmpeg DSA-6080-1 Advisory
  • Ubuntu 20.04 LTS: USN-7922-1 Linux Kernel Important Security Issues

Search

Translator

Tags

Business and industry code Community cPanel CVE Debian Debian Linux Distribution - Security Advisories Development Events Fedora Fedora Linux Distribution - Security Advisories General Hosting Important Advisory Linux Moderate Advisory Month in WordPress news Parallels Plesk Parallels Plesk Panel Performance PHP Plesk news and announcements Plesk Panel Podcast ProdDevSec Product and technology Products Project Release News Red Hat Red Hat Linux Distribution - Security Advisories Releases security Security Centre sensitive site Ubuntu Ubuntu Linux Distribution - Security Advisories update updates Various vulnerability Web Server Survey Wordpress wp-briefing

Posts

Helpful Links

  • Liquidweb.com
  • MYSQL Dev Documentation
  • Plugins
  • Source forge SED command
  • Themes
  • WordPress Documentation
  • You Tube
December 2025
M T W T F S S
« Nov    
1234567
891011121314
15161718192021
22232425262728
293031  
  • Google
  • Yahoo
  • Liquid Web
  • Storm
  • YouTube

©1999-2025 Ike.ninja | Powered by WordPress with Easel | Subscribe: RSS | Back to Top ↑

50 queries. 8.5 mb Memory usage. 0.303 seconds.