Possible attack detected. This action has been logged.

Discussion in 'Installation/Configuration' started by pecka33, Oct 18, 2022.

  1. pecka33

    pecka33 Member

    Hello,

    i am using latest debian 11 and latest ispconfig. All working fine, i did updated all the time. Today i have a problem - can not access to ispconfig - i have installed it more then 1 year and never had the problem.
    In ispconfig i get blank page with
    • Possible attack detected. This action has been logged.
    What does it mean, how can i found why this happened? I found this https://forum.howtoforge.com/thread...k-detected-this-action-has-been-logged.78605/ ant i will try it

    But i need to found out why this is happened.Any ideas?
     
  2. pecka33

    pecka33 Member

    At all,when i clear cache all works fine. But i dont know why this happened
     
  3. till

    till Super Moderator Staff Member ISPConfig Developer

    Most likely you run a website or web-based software on the exact same domain as the ISPConfig GUI and this other software sets cookies which then get sent to ISPConfig when you access ISPConfig and ISPConfig has not set the cookies itself.

    You can find exact details in the ISPConfig monitor module in ISPConfig's system log.
     
    pecka33 likes this.
  4. pecka33

    pecka33 Member

    Thank you. Yes, i have ispconfig on the exact same domain as the ISPConfig. But how is possible? The same sites without any changes etc with the ispconfig on the same domain i have more than 1 year and everything working fine. I have this problem first time today.

    in ispconfig log i can see this log.



    Code:
    [INTERFACE]: PHP IDS Alert.Total impact: 20<br/> Affected tags: xss, csrf, rfe<br/> <br/> Variable: COOKIE.__gads | Value: ID=0441122160ad3503-22cfc233e2cd009b:T=1659539185:RT=1659539185:S=ALNI_MYioN9RO_kvO60vmYFs-ZGH-VxaKA<br/> Impact: 10 | Tags: xss, csrf, rfe<br/> Description: Detects JavaScript location/document property access and window access obfuscation | Tags: xss, csrf | ID 23<br/> Description: Detects data: URL injections, VBS injections and common URI schemes | Tags: xss, rfe | ID 27<br/> <br/> Variable: COOKIE.__gpi | Value: UID=00000b74634aab63:T=1665993604:RT=1665993604:S=ALNI_MYNfCEVzDYe34kY1tfYrWqxwuHJ9w<br/> Impact: 10 | Tags: xss, csrf, rfe<br/> Description: Detects JavaScript location/document property access and window access obfuscation | Tags: xss, csrf | ID 23<br/> Description: Detects data: URL injections, VBS injections and common URI schemes | Tags: xss, rfe | ID 27<br/> <br/>
     
  5. till

    till Super Moderator Staff Member ISPConfig Developer

    Seems to be a cookie from Google:

    https://cookiedatabase.org/cookie/google-various-services/__gpi/

    If I remember correctly, I read somewhere that Google started to insert cookies under the name of the website now these days.

    There is a file /usr/local/ispconfig/security/ids.whitelist which can be used to whitelist certain variables, but you can't create a wildcard whitelist item at the moment to whitelist __gads globally for all pages. I will see if I can add an option for that as probably more users will experience that in future that use Google services.
     
    pecka33 likes this.
  6. till

    till Super Moderator Staff Member ISPConfig Developer

  7. c3n

    c3n Member

    This "Possible attack detected. This action has been logged." is serious issue because i got logic like this client has domain.com -- the panel is on subdomain.domain.com
    so it will be good to make fixes in next update because it is making too much trouble... i know that we need to secure with IDS but this is not working as expected. Also possibility to create whitelist.

     
  8. till

    till Super Moderator Staff Member ISPConfig Developer

    This is working perfectly fine and as expected in ISPConfig 3.2.9p1 and it is not causing any issues, especially no serious issues, on properly set-up systems. Plus you know already how to fix it if your system was not set up in the right way, see post #6. You have two options now:

    1) Fix your system setup so that other software does not try to inject cookies into ISPConfig, which triggers the IDS warning. This means the software you run on domain.com must set its cookies for domain.com only and not other subdomains. So this is not related to ISPConfig. It's simply a wrong setup in the software you installed on domain.com
    2) If you do not want or are able to fix your setup or the software on domain.com does not allow you to set up cookies properly for domain.com only, then you can do what I described in post #6.

    The code change you highlighted has already been included in ISPConfig btw. So you might have missed keeping your system up to date if its not on your server yet. And there can not be another fix besides the two options I mentioned above, so asking us to make changes in ISPConfig makes not much sense as one can either detect cookie injections and react to them or whitelist the offending cookie as described in #6. There is a third option of course, disable IDS completely, but that#s not a good option as you mentioned yourself.

    That's exactly what's described in post #6 in this thread and available in the current ISPConfig release.
     

Share This Page