I am currently expriencing the following bug "Possible attack detected. This action has been logged." Code: [INTERFACE]: PHP IDS Alert.Total impact: 32 <br/> Affected tags: sqli, id, lfi, xss, csrf, rfe<br/> <br/> Variable: COOKIE.paypalplus_session_v2 | Value:{"mode":"sandbox","useraction":"commit" ,"language":"de_DE","country":"DE","ecToken":"EC-8JX009565A671943C","thirdPartyMethods": {}, "paymentMethod":"pp-db2fae5d7a8068bc159f4e8c1ea36294"}<br/> Impact: 32 | Tags: sqli, id, lfi, xss, csrf, rfe<br/> Description: Detects classic SQL injection probings 2/2 | Tags: sqli, id, lfi | ID 43<br/> Description: Detects basic SQL authentication bypass attempts 2/3 | Tags: sqli, id, lfi | ID 45<br/> Description: Detects basic SQL authentication bypass attempts 3/3 | Tags: sqli, id, lfi | ID 46<br/> Description: Detects MySQL comment-/space-obfuscated injections and backtick termination | Tags: sqli, id | ID 57<br/> Description: Detects unknown attack vectors based on PHPIDS Centrifuge detection | Tags: xss, csrf, id, rfe, lfi | ID 67<br/> <br/> It is caused by a wordpress site with woocommerce and paypal plus plugin which obviously sets a bad paypal plus cookie. Th WP site is running on xxx.de and ispconfig on a subdomain of xxx.de. Do you know how I can solve this problem cause I always get now "Possible attack detected. This action has been logged." when I try to log in after visiting the wordpress site. My idea would be to allow this specific cookie in the ids.whitelist just do not really know how and it might even be kinda the worst solution by security reasons. Wordpress 5.4 ISPconfig 3.1.15p3 I know the answer of till to a similar problem but i cannot really change the paypal plus cookie
As you suspect, you can configure the ids whitelist to ignore that (use file /usr/local/ispconfig/security/ids.whitelist.custom), or you could configure your web server to delete the cookie from the request before passing it to php.
You'll have to see what php file(s) are triggering, but based on your above output, Variable: COOKIE.paypalplus_session_v2 is what needs whitelisted. Eg. say it triggers when logging in, try: Code: admin:/login/index.php:COOKIE.paypalplus_session_v2 user:/login/index.php:COOKIE.paypalplus_session_v2 any:/login/index.php:COOKIE.paypalplus_session_v2 If it triggers on every single request/php script, probably there's a better solution. Delete the cookie in your browser, or use your browser in incognito mode, or remove the cookie via your web server.
it does not really satisfy me. Why is by any chance the paypal plus cookie at all triggering the ids? so the ids.log says that ids is triggered at ea ch php script becuse of the paypal cookie
Fair enough. You could work on the other side and fix the PayPal plus plugin to not set the cookie for all subdomains, but only where you actually are using it. Or even use a different domain for the two, to avoid the issue entirely. Because the contents of the cookie match a few of the built in IDS signatures. Yeah, I figured it might. @till, do you know if there is a way to whitelist this cookie for all scripts in the IDS whitelist? It's not very practical to specify every single PHP file for a case like this.