Something magicaladded a rule to allow a certain mod_security id for that domain

In the case of those who can control via .htaccess you can try
Code: Select all
# Should mod_security inspect POST payloads
SecFilterScanPOST Off
Alane
----------------------------------------------
Cms Version: 1.8.2
Installed Modules:
* CMSMailer: 2.0
* FileManager: 1.0.2
* MenuManager: 1.6.5
* ModuleManager: 1.4
* News: 2.10.6
* nuSOAP: 1.0.2
* Printing: 1.1.0
* Search: 1.6.5
* ThemeManager: 1.1.1
* TinyMCE: 2.7.3
* TemplateExternalizer: 1.2
* BulkStructure: 0.4
* Gallery: 1.4.1
* Guestbook: 1.3.0
* CGExtensions: 1.21
* CGCalendar: 1.5.6
* CGSimpleSmarty: 1.4.5
* GBFilePicker: 1.1
* FrontEndUsers: 1.12.5
* CustomContent: 1.7.3
* Uploads: 1.11.5
* touchInlineEdit: 1.7
Config Information:
* php_memory_limit:
* process_whole_template: false
* output_compression: false
* max_upload_size: 32000000
* default_upload_permission: 664
* url_rewriting: mod_rewrite
* page_extension: .html
* query_var: page
* use_hierarchy: true
* image_manipulation_prog: GD
* auto_alias_content: true
* locale:
* default_encoding: utf-8
* admin_encoding: utf-8
* set_names: true
Php Information:
* phpversion: 5.2.14
* md5_function: On (True)
* gd_version: 2
* tempnam_function: On (True)
* magic_quotes_runtime: Off (False)
* E_STRICT: 0
* memory_limit: 128M
* max_execution_time: 120
* output_buffering: On
* safe_mode: Off (False)
* file_uploads: On (True)
* post_max_size: 32M
* upload_max_filesize: 32M
* session_save_path: /tmp (1777)
* session_use_cookies: On (True)
* xml_function: On (True)
Server Information:
* Server Api: cgi
* Server Db Type: MySQL (mysql)
* Server Db Version: 5.0.91
----------------------------------------------