pastebin - collaborative debugging tool
kpaste.net RSS


Untitled
Posted by Anonymous on Mon 17th Aug 2015 13:45
raw | new post

  1. [Tue Aug 11 09:14:01.842035 2015] [:error] [pid 975163] [client 201.148.105.27] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:POST|GET)" at REQUEST_METHOD. [file "/etc/httpd/modsec/99_asl_jitp.conf"] [line "182"] [id "336461"] [rev "8"] [msg "Atomicorp.com WAF Rules - Virtual Just In Time Patch: Possible attempt to maliciously access wp-config.php file"] [data "../wp-config.php"] [severity "CRITICAL"] [hostname "cmmichimalonco.cl"] [uri "/wp-admin/admin-ajax.php"] [unique_id "VcnnCb7ERd0ADuE76S0AAAAa"]
  2.  
  3. [Tue Aug 11 09:13:55.977517 2015] [:error] [pid 833753] [client 201.148.105.27] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:POST|GET)" at REQUEST_METHOD. [file "/etc/httpd/modsec/99_asl_jitp.conf"] [line "182"] [id "336461"] [rev "8"] [msg "Atomicorp.com WAF Rules - Virtual Just In Time Patch: Possible attempt to maliciously access wp-config.php file"] [data "../wp-config.php"] [severity "CRITICAL"] [hostname "www.iconinteractive.cl"] [uri "/wp-admin/admin-ajax.php"] [unique_id "VcnnA75ued4ADLjZQV4AAAAQ"]
  4.  
  5. [Tue Aug 11 09:13:30.221661 2015] [:error] [pid 444461] [client 201.148.105.27] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:POST|GET)" at REQUEST_METHOD. [file "/etc/httpd/modsec/99_asl_jitp.conf"] [line "182"] [id "336461"] [rev "8"] [msg "Atomicorp.com WAF Rules - Virtual Just In Time Patch: Possible attempt to maliciously access wp-config.php file"] [data "../wp-config.php"] [severity "CRITICAL"] [hostname "www.jasacor.cl"] [uri "/wp-admin/admin-ajax.php"] [unique_id "Vcnm6r7ERdMABsgtfM0AAAAa"]
  6.  
  7. [Mon Aug 10 14:35:49.025244 2015] [:error] [pid 701175] [client 201.148.105.27] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:POST|GET)" at REQUEST_METHOD. [file "/etc/httpd/modsec/99_asl_jitp.conf"] [line "180"] [id "336461"] [rev "8"] [msg "Atomicorp.com WAF Rules - Virtual Just In Time Patch: Possible attempt to maliciously access wp-config.php file"] [data "../wp-config.php"] [severity "CRITICAL"] [hostname "puntitodeluz.cl"] [uri "/wp-admin/admin-ajax.php"] [unique_id "Vcjg9L5ue9sACrL38qAAAABN"]
  8. [Mon Aug 10 14:35:54.176932 2015] [:error] [pid 698497] [client 201.148.105.27] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:POST|GET)" at REQUEST_METHOD. [file "/etc/httpd/modsec/99_asl_jitp.conf"] [line "180"] [id "336461"] [rev "8"] [msg "Atomicorp.com WAF Rules - Virtual Just In Time Patch: Possible attempt to maliciously access wp-config.php file"] [data "../wp-config.php"] [severity "CRITICAL"] [hostname "puntitodeluz.cl"] [uri "/tag/word-press/wp-admin/admin-ajax.php"] [unique_id "Vcjg@r5ue9sACqiB-jwAAABG"]

Submit a correction or amendment below (click here to make a fresh posting)
After submitting an amendment, you'll be able to view the differences between the old and new posts easily.

Syntax highlighting:

To highlight particular lines, prefix each line with {%HIGHLIGHT}





All content is user-submitted.
The administrators of this site (kpaste.net) are not responsible for their content.
Abuse reports should be emailed to us at