Hi Boris,
Thank you for your response!
I must disagree with you if this is a bug or not but for me it’s working now, hence it doesn’t matter anymore…
It’s definitely triggered by ultimate member script.
I will try to explain a bit more for other people who can run into the same problem.
The login page generated by ultimate member passes the login variables in a “bad” way, that’s why the rule is triggered. To give an exact example, in my case the shortcode used for the unaltered login page is: [ultimatemember form_id=189]
When trying to login from that page, I get the following violation:
Pattern match "(?i:\\b(?:t(?:able_name\\b|extpos[^a-zA-Z0-9_]{1,}\\()|(?:a(?:ll_objects|tt(?:rel|typ)id)|column_(?:id|name)|mb_users|object_(?:id|(?:nam|typ)e)|pg_(?:attribute|class)|rownum|s(?:ubstr(?:ing){0,1}|ys(?:c(?:at|o(?:lumn|nstraint)s)|dba|ibm|(?:filegroup|o ..." at ARGS_NAMES:user_password-189.
I should have seen it sooner but I wasn’t paying attention (long work day), there were no PHP errors generated. I disabled the rule for this particular site now, keep in mind that not all providers use these strikt rules.
I tested on a clean WP setup, got the same error.
Why I did not see this before is because my demo setup has no mod security rules active.
Greetings,
Richard
-
This reply was modified 8 years, 5 months ago by
CBServices. Reason: Thanks added for response from Boris
-
This reply was modified 8 years, 5 months ago by
CBServices. Reason: Thanks added for response from Boris