OJS3.1.1 Adding participants loadding

ojs3-error-assign

Help!
I have tried different options and the same thing always happens. When I want to add participants to a submission, it stays loadding and never loads the list.
It is installed like this:
Current version: 3.1.1.0
Server information
Configuration name Configuration value
Linux OS Platform
PHP version 7.1.18
Apache
Driver of the database mysqli
Database server version 5.5.59-cll
i’m acces to the server with C-Panel
Write in index.php the line Ini_set (‘display_errors’, E_ALL); and don`t shoe anything.
Please. Any idea?

Hi @Matias_Vlahusic,

Don’t use ini_set ('display_errors', E_ALL); – this will cause PHP errors to interfere with AJAX requests. Check your PHP error log instead.

Regards,
Alec Smecher
Public Knowledge Project Team

Thanks for your request. This is the error log:
[Fri Jun 01 11:21:04.224453 2018] [:error] [pid 7233:tid 139802529679104] [client 24.232.90.130:32690] [client 24.232.90.130] ModSecurity: Access denied with code 406 (phase 2). Pattern match “(?:\\b(?:(?:s(?:ys\\.(?:user_(?:(?:t(?:ab(?:column|le)|rigger)|object|view)s|c(?:onstraints|atalog))|all_tables|tab)|elect\\b.{0,40}\\b(?:substring|ascii|user))|m(?:sys(?:(?:queri|ac)e|relationship|column|object)s|ysql.user)|c(?:onstraint_type|harinde …" at REQUEST_FILENAME. [file “/etc/apache2/conf.d/modsec/modsec2.user.conf”] [line “75”] [id “1234123422”] [msg “Blind SQL Injection Attack”] [data “select/user”] [severity “CRITICAL”] [tag “WEB_ATTACK/SQL_INJECTION”] [hostname “aaot.aaot.org.ar”] [uri “/~ojsaaot/ojs/index.php/AAOTMAG/$$$call$$$/grid/users/user-select/user-select-grid/fetch-grid”] [unique_id “WxFWUCBfJQlUXnqic44frAAAANQ”], referer: https://aaot.aaot.org.ar/~ojsaaot/ojs/index.php/AAOTMAG/workflow/index/1/1
[Fri Jun 01 11:27:26.478845 2018] [:error] [pid 7233:tid 139802603108096] [client 24.232.90.130:36567] [client 24.232.90.130] ModSecurity: Access denied with code 406 (phase 2). Pattern match "(?:\\b(?:(?:s(?:ys\\.(?:user
(?:(?:t(?:ab(?:column|le)|rigger)|object|view)s|c(?:onstraints|atalog))|all_tables|tab)|elect\\b.{0,40}\\b(?:substring|ascii|user))|m(?:sys(?:(?:queri|ac)e|relationship|column|object)s|ysql.user)|c(?:onstraint_type|harinde …" at REQUEST_FILENAME. [file “/etc/apache2/conf.d/modsec/modsec2.user.conf”] [line “75”] [id “1234123422”] [msg “Blind SQL Injection Attack”] [data “select/user”] [severity “CRITICAL”] [tag “WEB_ATTACK/SQL_INJECTION”] [hostname “aaot.aaot.org.ar”] [uri “/~ojsaaot/ojs/index.php/AAOTMAG/$$$call$$$/grid/users/user-select/user-select-grid/fetch-grid”] [unique_id “WxFXziBfJQlUXnqic44gQgAAAM0”], referer: https://aaot.aaot.org.ar/~ojsaaot/ojs/index.php/AAOTMAG/workflow/index/1/3
[Fri Jun 01 11:32:14.917186 2018] [:error] [pid 24646:tid 139802613597952] [client 24.232.90.130:34866] [client 24.232.90.130] ModSecurity: Access denied with code 406 (phase 2). Pattern match "(?:\\b(?:(?:s(?:ys\\.(?:user
(?:(?:t(?:ab(?:column|le)|rigger)|object|view)s|c(?:onstraints|atalog))|all_tables|tab)|elect\\b.{0,40}\\b(?:substring|ascii|user))|m(?:sys(?:(?:queri|ac)e|relationship|column|object)s|ysql.user)|c(?:onstraint_type|harinde …" at REQUEST_FILENAME. [file “/etc/apache2/conf.d/modsec/modsec2.user.conf”] [line “75”] [id “1234123422”] [msg “Blind SQL Injection Attack”] [data “select/user”] [severity “CRITICAL”] [tag “WEB_ATTACK/SQL_INJECTION”] [hostname “aaot.aaot.org.ar”] [uri “/~ojsaaot/ojs/index.php/AAOTMAG/$$$call$$$/grid/users/user-select/user-select-grid/fetch-grid”] [unique_id “WxFY7v0nMB07ZR9qan3NQQAAAM0”], referer: https://aaot.aaot.org.ar/~ojsaaot/ojs/index.php/AAOTMAG/workflow/index/1/3
[Fri Jun 01 11:32:50.627372 2018] [:error] [pid 24458:tid 139802655557376] [client 24.232.90.130:31147] [client 24.232.90.130] ModSecurity: Access denied with code 406 (phase 2). Pattern match "(?:\\b(?:(?:s(?:ys\\.(?:user
(?:(?:t(?:ab(?:column|le)|rigger)|object|view)s|c(?:onstraints|atalog))|all_tables|tab)|elect\\b.{0,40}\\b(?:substring|ascii|user))|m(?:sys(?:(?:queri|ac)e|relationship|column|object)s|ysql.user)|c(?:onstraint_type|harinde …" at REQUEST_FILENAME. [file “/etc/apache2/conf.d/modsec/modsec2.user.conf”] [line “75”] [id “1234123422”] [msg “Blind SQL Injection Attack”] [data “select/user”] [severity “CRITICAL”] [tag “WEB_ATTACK/SQL_INJECTION”] [hostname “aaot.aaot.org.ar”] [uri “/~ojsaaot/ojs/index.php/AAOTMAG/$$$call$$$/grid/users/user-select/user-select-grid/fetch-grid”] [unique_id “WxFZEhpDtFYa1ad8AvfJAgAAAUg”], referer: https://aaot.aaot.org.ar/~ojsaaot/ojs/index.php/AAOTMAG/workflow/index/1/3
[Fri Jun 01 11:33:17.516039 2018] [:error] [pid 24457:tid 139802582128384] [client 24.232.90.130:50310] [client 24.232.90.130] ModSecurity: Access denied with code 406 (phase 2). Pattern match "(?:\\b(?:(?:s(?:ys\\.(?:user
(?:(?:t(?:ab(?:column|le)|rigger)|object|view)s|c(?:onstraints|atalog))|all_tables|tab)|elect\\b.{0,40}\\b(?:substring|ascii|user))|m(?:sys(?:(?:queri|ac)e|relationship|column|object)s|ysql.user)|c(?:onstraint_type|harinde …" at REQUEST_FILENAME. [file “/etc/apache2/conf.d/modsec/modsec2.user.conf”] [line “75”] [id “1234123422”] [msg “Blind SQL Injection Attack”] [data “select/user”] [severity “CRITICAL”] [tag “WEB_ATTACK/SQL_INJECTION”] [hostname “aaot.aaot.org.ar”] [uri “/~ojsaaot/ojs/index.php/AAOTMAG/$$$call$$$/grid/users/user-select/user-select-grid/fetch-grid”] [unique_id “WxFZLXkqnzRIKPM15h8m9wAAAI8”], referer: https://aaot.aaot.org.ar/~ojsaaot/ojs/index.php/AAOTMAG/workflow/index/1/3
[Fri Jun 01 11:33:52.818945 2018] [:error] [pid 24458:tid 139802582128384] [client 24.232.90.130:47771] [client 24.232.90.130] ModSecurity: Access denied with code 406 (phase 2). Pattern match "(?:\\b(?:(?:s(?:ys\\.(?:user
(?:(?:t(?:ab(?:column|le)|rigger)|object|view)s|c(?:onstraints|atalog))|all_tables|tab)|elect\\b.{0,40}\\b(?:substring|ascii|user))|m(?:sys(?:(?:queri|ac)e|relationship|column|object)s|ysql.user)|c(?:onstraint_type|harinde …" at REQUEST_FILENAME. [file “/etc/apache2/conf.d/modsec/modsec2.user.conf”] [line “75”] [id “1234123422”] [msg “Blind SQL Injection Attack”] [data “select/user”] [severity “CRITICAL”] [tag “WEB_ATTACK/SQL_INJECTION”] [hostname “aaot.aaot.org.ar”] [uri “/~ojsaaot/ojs/index.php/AAOTMAG/$$$call$$$/grid/users/user-select/user-select-grid/fetch-grid”] [unique_id “WxFZUBpDtFYa1ad8AvfJXAAAAU8”], referer: https://aaot.aaot.org.ar/~ojsaaot/ojs/index.php/AAOTMAG/workflow/index/1/3
[Thu Jun 07 10:29:41.951248 2018] [:error] [pid 20708:tid 139802708006656] [client 24.232.90.130:30612] [client 24.232.90.130] ModSecurity: Access denied with code 406 (phase 2). Pattern match "(?:\\b(?:(?:s(?:ys\\.(?:user
(?:(?:t(?:ab(?:column|le)|rigger)|object|view)s|c(?:onstraints|atalog))|all_tables|tab)|elect\\b.{0,40}\\b(?:substring|ascii|user))|m(?:sys(?:(?:queri|ac)e|relationship|column|object)s|ysql.user)|c(?:onstraint_type|harinde …" at REQUEST_FILENAME. [file “/etc/apache2/conf.d/modsec/modsec2.user.conf”] [line “75”] [id “1234123422”] [msg “Blind SQL Injection Attack”] [data “select/user”] [severity “CRITICAL”] [tag “WEB_ATTACK/SQL_INJECTION”] [hostname “aaot.aaot.org.ar”] [uri “/~ojsaaot/ojs/index.php/AAOTMAG/$$$call$$$/grid/users/user-select/user-select-grid/fetch-grid”] [unique_id “WxkzRbrVspoZoWD7Y-juogAAAMM”], referer: https://aaot.aaot.org.ar/~ojsaaot/ojs/index.php/AAOTMAG/workflow/index/1/3
[Thu Jun 07 10:30:13.466507 2018] [:error] [pid 20707:tid 139802655557376] [client 24.232.90.130:1477] [client 24.232.90.130] ModSecurity: Access denied with code 406 (phase 2). Pattern match "(?:\\b(?:(?:s(?:ys\\.(?:user
(?:(?:t(?:ab(?:column|le)|rigger)|object|view)s|c(?:onstraints|atalog))|all_tables|tab)|elect\\b.{0,40}\\b(?:substring|ascii|user))|m(?:sys(?:(?:queri|ac)e|relationship|column|object)s|ysql.user)|c(?:onstraint_type|harinde …" at REQUEST_FILENAME. [file “/etc/apache2/conf.d/modsec/modsec2.user.conf”] [line “75”] [id “1234123422”] [msg “Blind SQL Injection Attack”] [data “select/user”] [severity “CRITICAL”] [tag “WEB_ATTACK/SQL_INJECTION”] [hostname “aaot.aaot.org.ar”] [uri “/~ojsaaot/ojs/index.php/AAOTMAG/$$$call$$$/grid/users/user-select/user-select-grid/fetch-grid”] [unique_id “WxkzZezxIk4Cb1bQaDAjEgAAAEg”], referer: https://aaot.aaot.org.ar/~ojsaaot/ojs/index.php/AAOTMAG/workflow/index/1/3
[Thu Jun 07 10:30:36.937301 2018] [:error] [pid 20807:tid 139802498209536] [client 24.232.90.130:32151] [client 24.232.90.130] ModSecurity: Access denied with code 406 (phase 2). Pattern match "(?:\\b(?:(?:s(?:ys\\.(?:user
(?:(?:t(?:ab(?:column|le)|rigger)|object|view)s|c(?:onstraints|atalog))|all_tables|tab)|elect\\b.{0,40}\\b(?:substring|ascii|user))|m(?:sys(?:(?:queri|ac)e|relationship|column|object)s|ysql.user)|c(?:onstraint_type|harinde …" at REQUEST_FILENAME. [file “/etc/apache2/conf.d/modsec/modsec2.user.conf”] [line “75”] [id “1234123422”] [msg “Blind SQL Injection Attack”] [data “select/user”] [severity “CRITICAL”] [tag “WEB_ATTACK/SQL_INJECTION”] [hostname “aaot.aaot.org.ar”] [uri “/~ojsaaot/ojs/index.php/AAOTMAG/$$$call$$$/grid/users/user-select/user-select-grid/fetch-grid”] [unique_id “WxkzfIXoClFysUdBuRlI3gAAARc”], referer: https://aaot.aaot.org.ar/~ojsaaot/ojs/index.php/AAOTMAG/workflow/index/1/3
[Thu Jun 07 10:30:58.261317 2018] [:error] [pid 20807:tid 139802519189248] [client 24.232.90.130:34236] [client 24.232.90.130] ModSecurity: Access denied with code 406 (phase 2). Pattern match "(?:\\b(?:(?:s(?:ys\\.(?:user
(?:(?:t(?:ab(?:column|le)|rigger)|object|view)s|c(?:onstraints|atalog))|all_tables|tab)|elect\\b.{0,40}\\b(?:substring|ascii|user))|m(?:sys(?:(?:queri|ac)e|relationship|column|object)s|ysql.user)|c(?:onstraint_type|harinde …" at REQUEST_FILENAME. [file “/etc/apache2/conf.d/modsec/modsec2.user.conf”] [line “75”] [id “1234123422”] [msg “Blind SQL Injection Attack”] [data “select/user”] [severity “CRITICAL”] [tag “WEB_ATTACK/SQL_INJECTION”] [hostname “aaot.aaot.org.ar”] [uri “/~ojsaaot/ojs/index.php/AAOTMAG/$$$call$$$/grid/users/user-select/user-select-grid/fetch-grid”] [unique_id “WxkzkoXoClFysUdBuRlJAAAAARU”], referer: https://aaot.aaot.org.ar/~ojsaaot/ojs/index.php/AAOTMAG/workflow/index/1/3
[Thu Jun 07 10:31:38.307125 2018] [:error] [pid 20807:tid 139802613597952] [client 24.232.90.130:18445] [client 24.232.90.130] ModSecurity: Access denied with code 406 (phase 2). Pattern match "(?:\\b(?:(?:s(?:ys\\.(?:user
(?:(?:t(?:ab(?:column|le)|rigger)|object|view)s|c(?:onstraints|atalog))|all_tables|tab)|elect\\b.{0,40}\\b(?:substring|ascii|user))|m(?:sys(?:(?:queri|ac)e|relationship|column|object)s|ysql.user)|c(?:onstraint_type|harinde …" at REQUEST_FILENAME. [file “/etc/apache2/conf.d/modsec/modsec2.user.conf”] [line “75”] [id “1234123422”] [msg “Blind SQL Injection Attack”] [data “select/user”] [severity “CRITICAL”] [tag “WEB_ATTACK/SQL_INJECTION”] [hostname “aaot.aaot.org.ar”] [uri “/~ojsaaot/ojs/index.php/AAOTMAG/$$$call$$$/grid/users/user-select/user-select-grid/fetch-grid”] [unique_id “WxkzuoXoClFysUdBuRlJCAAAAQw”], referer: https://aaot.aaot.org.ar/~ojsaaot/ojs/index.php/AAOTMAG/workflow/index/1/3
[Thu Jun 07 10:32:33.277427 2018] [:error] [pid 28864:tid 139802718496512] [client 24.232.90.130:53853] [client 24.232.90.130] ModSecurity: Access denied with code 406 (phase 2). Pattern match "(?:\\b(?:(?:s(?:ys\\.(?:user
(?:(?:t(?:ab(?:column|le)|rigger)|object|view)s|c(?:onstraints|atalog))|all_tables|tab)|elect\\b.{0,40}\\b(?:substring|ascii|user))|m(?:sys(?:(?:queri|ac)e|relationship|column|object)s|ysql.user)|c(?:onstraint_type|harinde …" at REQUEST_FILENAME. [file “/etc/apache2/conf.d/modsec/modsec2.user.conf”] [line “75”] [id “1234123422”] [msg “Blind SQL Injection Attack”] [data “select/user”] [severity “CRITICAL”] [tag “WEB_ATTACK/SQL_INJECTION”] [hostname “aaot.aaot.org.ar”] [uri “/~ojsaaot/ojs/index.php/AAOTMAG/$$$call$$$/grid/users/user-select/user-select-grid/fetch-grid”] [unique_id “Wxkz8V3vz2HmlYrw82zNJQAAAAM”], referer: https://aaot.aaot.org.ar/~ojsaaot/ojs/index.php/AAOTMAG/workflow/index/1/3
[Thu Jun 07 10:33:46.374760 2018] [:error] [pid 29188:tid 139802645067520] [client 24.232.90.130:38856] [client 24.232.90.130] ModSecurity: Access denied with code 406 (phase 2). Pattern match "(?:\\b(?:(?:s(?:ys\\.(?:user
(?:(?:t(?:ab(?:column|le)|rigger)|object|view)s|c(?:onstraints|atalog))|all_tables|tab)|elect\\b.{0,40}\\b(?:substring|ascii|user))|m(?:sys(?:(?:queri|ac)e|relationship|column|object)s|ysql.user)|c(?:onstraint_type|harinde …" at REQUEST_FILENAME. [file “/etc/apache2/conf.d/modsec/modsec2.user.conf”] [line “75”] [id “1234123422”] [msg “Blind SQL Injection Attack”] [data “select/user”] [severity “CRITICAL”] [tag “WEB_ATTACK/SQL_INJECTION”] [hostname “aaot.aaot.org.ar”] [uri “/~ojsaaot/ojs/index.php/AAOTMAG/$$$call$$$/grid/users/user-select/user-select-grid/fetch-grid”] [unique_id “Wxk0OiVh-@uZ8QDIK3xMzgAAAAk”], referer: https://aaot.aaot.org.ar/~ojsaaot/ojs/index.php/AAOTMAG/workflow/index/1/3
[Thu Jun 07 10:37:57.553127 2018] [:error] [pid 29538:tid 139802592618240] [client 24.232.90.130:56408] [client 24.232.90.130] ModSecurity: Access denied with code 406 (phase 2). Pattern match "(?:\\b(?:(?:s(?:ys\\.(?:user
(?:(?:t(?:ab(?:column|le)|rigger)|object|view)s|c(?:onstraints|atalog))|all_tables|tab)|elect\\b.{0,40}\\b(?:substring|ascii|user))|m(?:sys(?:(?:queri|ac)e|relationship|column|object)s|ysql.user)|c(?:onstraint_type|harinde …" at REQUEST_FILENAME. [file “/etc/apache2/conf.d/modsec/modsec2.user.conf”] [line “75”] [id “1234123422”] [msg “Blind SQL Injection Attack”] [data “select/user”] [severity “CRITICAL”] [tag “WEB_ATTACK/SQL_INJECTION”] [hostname “aaot.aaot.org.ar”] [uri “/~ojsaaot/ojs/index.php/AAOTMAG/$$$call$$$/grid/users/user-select/user-select-grid/fetch-grid”] [unique_id “Wxk1NcT8NGO4l5NYivh4dQAAAM4”], referer: https://aaot.aaot.org.ar/~ojsaaot/ojs/index.php/AAOTMAG/workflow/index/1/3
[Thu Jun 07 10:38:26.983228 2018] [:error] [pid 29509:tid 139802529679104] [client 24.232.90.130:10062] [client 24.232.90.130] ModSecurity: Access denied with code 406 (phase 2). Pattern match "(?:\\b(?:(?:s(?:ys\\.(?:user
(?:(?:t(?:ab(?:column|le)|rigger)|object|view)s|c(?:onstraints|atalog))|all_tables|tab)|elect\\b.{0,40}\\b(?:substring|ascii|user))|m(?:sys(?:(?:queri|ac)e|relationship|column|object)s|ysql.user)|c(?:onstraint_type|harinde …" at REQUEST_FILENAME. [file “/etc/apache2/conf.d/modsec/modsec2.user.conf”] [line “75”] [id “1234123422”] [msg “Blind SQL Injection Attack”] [data “select/user”] [severity “CRITICAL”] [tag “WEB_ATTACK/SQL_INJECTION”] [hostname “aaot.aaot.org.ar”] [uri “/~ojsaaot/ojs/index.php/AAOTMAG/$$$call$$$/grid/users/user-select/user-select-grid/fetch-grid”] [unique_id “Wxk1Uu0QqxzYhFlsIBwC-QAAAJQ”], referer: https://aaot.aaot.org.ar/~ojsaaot/ojs/index.php/AAOTMAG/workflow/index/1/3
[Thu Jun 07 10:55:07.249560 2018] [:error] [pid 29509:tid 139802645067520] [client 24.232.90.130:28859] [client 24.232.90.130] ModSecurity: Access denied with code 406 (phase 2). Pattern match "(?:\\b(?:(?:s(?:ys\\.(?:user
(?:(?:t(?:ab(?:column|le)|rigger)|object|view)s|c(?:onstraints|atalog))|all_tables|tab)|elect\\b.{0,40}\\b(?:substring|ascii|user))|m(?:sys(?:(?:queri|ac)e|relationship|column|object)s|ysql.user)|c(?:onstraint_type|harinde …" at REQUEST_FILENAME. [file “/etc/apache2/conf.d/modsec/modsec2.user.conf”] [line “75”] [id “1234123422”] [msg “Blind SQL Injection Attack”] [data “select/user”] [severity “CRITICAL”] [tag “WEB_ATTACK/SQL_INJECTION”] [hostname “aaot.aaot.org.ar”] [uri “/~ojsaaot/ojs/index.php/AAOTMAG/$$$call$$$/grid/users/user-select/user-select-grid/fetch-grid”] [unique_id “Wxk5O@0QqxzYhFlsIBwEugAAAIk”], referer: https://aaot.aaot.org.ar/~ojsaaot/ojs/index.php/AAOTMAG/workflow/index/1/3
[Thu Jun 07 10:55:18.623690 2018] [:error] [pid 29538:tid 139802540168960] [client 24.232.90.130:36650] [client 24.232.90.130] ModSecurity: Access denied with code 406 (phase 2). Pattern match "(?:\\b(?:(?:s(?:ys\\.(?:user
(?:(?:t(?:ab(?:column|le)|rigger)|object|view)s|c(?:onstraints|atalog))|all_tables|tab)|elect\\b.{0,40}\\b(?:substring|ascii|user))|m(?:sys(?:(?:queri|ac)e|relationship|column|object)s|ysql.user)|c(?:onstraint_type|harinde …" at REQUEST_FILENAME. [file “/etc/apache2/conf.d/modsec/modsec2.user.conf”] [line “75”] [id “1234123422”] [msg “Blind SQL Injection Attack”] [data “select/user”] [severity “CRITICAL”] [tag “WEB_ATTACK/SQL_INJECTION”] [hostname “aaot.aaot.org.ar”] [uri “/~ojsaaot/ojs/index.php/AAOTMAG/$$$call$$$/grid/users/user-select/user-select-grid/fetch-grid”] [unique_id “Wxk5RsT8NGO4l5NYivh6GgAAANM”], referer: https://aaot.aaot.org.ar/~ojsaaot/ojs/index.php/AAOTMAG/workflow/index/1/3
[Thu Jun 07 10:57:00.549271 2018] [:error] [pid 29509:tid 139802592618240] [client 24.232.90.130:52475] [client 24.232.90.130] ModSecurity: Access denied with code 406 (phase 2). Pattern match "(?:\\b(?:(?:s(?:ys\\.(?:user
(?:(?:t(?:ab(?:_column|le)|rigger)|object|view)s|c(?:onstraints|atalog))|all_tables|tab)|elect\\b.{0,40}\\b(?:substring|ascii|user))|m(?:sys(?:(?:queri|ac)e|relationship|column|object)s|ysql.user)|c(?:onstraint_type|harinde …” at REQUEST_FILENAME. [file “/etc/apache2/conf.d/modsec/modsec2.user.conf”] [line “75”] [id “1234123422”] [msg “Blind SQL Injection Attack”] [data “select/user”] [severity “CRITICAL”] [tag “WEB_ATTACK/SQL_INJECTION”] [hostname “aaot.aaot.org.ar”] [uri “/~ojsaaot/ojs/index.php/AAOTMAG/$$$call$$$/grid/users/user-select/user-select-grid/fetch-grid”] [unique_id “Wxk5rO0QqxzYhFlsIBwE5gAAAI4”], referer: https://aaot.aaot.org.ar/~ojsaaot/ojs/index.php/AAOTMAG/workflow/index/1/3

Hi. Now I deleted the “ini_set (‘display_errors’, E_ALL);” of the index.
This is a shorter copy of the error log result:
[11-Jun-2018 14:02:42 UTC] PHP Deprecated: Methods with the same name as their class will not be constructors in a future version of PHP; Smarty has a deprecated constructor in /home/ojsaaot/public_html/ojs/lib/pkp/lib/vendor/smarty/smarty/libs/Smarty.class.php on line 64
[11-Jun-2018 14:02:42 UTC] PHP Deprecated: Methods with the same name as their class will not be constructors in a future version of PHP; ADODB_Cache_File has a deprecated constructor in /home/ojsaaot/public_html/ojs/lib/pkp/lib/adodb/adodb.inc.php on line 263
[11-Jun-2018 14:02:42 UTC] PHP Deprecated: Methods with the same name as their class will not be constructors in a future version of PHP; ADOConnection has a deprecated constructor in /home/ojsaaot/public_html/ojs/lib/pkp/lib/adodb/adodb.inc.php on line 359
[11-Jun-2018 14:02:42 UTC] PHP Deprecated: Methods with the same name as their class will not be constructors in a future version of PHP; ADORecordSet has a deprecated constructor in /home/ojsaaot/public_html/ojs/lib/pkp/lib/adodb/adodb.inc.php on line 2921
[11-Jun-2018 14:02:42 UTC] PHP Deprecated: Methods with the same name as their class will not be constructors in a future version of PHP; ADORecordSet_array has a deprecated constructor in /home/ojsaaot/public_html/ojs/lib/pkp/lib/adodb/adodb.inc.php on line 3939
[11-Jun-2018 14:02:42 UTC] PHP Warning: Declaration of LensGalleyPlugin :: register ($ category, $ path) should be compatible with LazyLoadPlugin :: register ($ category, $ path, $ mainContextId = NULL) in /home/ojsaaot/public_html/ojs/plugins/generic/lensGalley/LensGalleyPlugin.inc.php on line 0
[11-Jun-2018 14:02:42 UTC] PHP Warning: Declaration of PKPUsageEventPlugin :: getEnabled () should be compatible with LazyLoadPlugin :: getEnabled ($ contextId = NULL) in / home / ojsaaot / public_html / ojs / lib / pkp / plugins / generic / usageEvent / PKPUsageEventPlugin.inc.php on line 0
[11-Jun-2018 14:02:42 UTC] PHP Warning: Declaration of CategoryGridHandler :: doSpecificFetchGridActions ($ args, $ request, & $ templateMgr) should be compatible with GridHandler :: doSpecificFetchGridActions ($ args, $ request, $ templateMgr ) in /home/ojsaaot/public_html/ojs/lib/pkp/classes/controllers/grid/CategoryGridHandler.inc.php on line 0
[11-Jun-2018 14:02:42 UTC] PHP Warning: Declaration of StageParticipantGridHandler :: initialize ($ request) should be compatible with CategoryGridHandler :: initialize ($ request, $ args = NULL) in / home / ojsaaot / public_html /ojs/lib/pkp/controllers/grid/users/stageParticipant/StageParticipantGridHandler.inc.php on line 24
[11-Jun-2018 14:02:42 UTC] PHP Warning: Declaration of StageParticipantGridHandler :: loadCategoryData ($ request, $ userGroup) should be compatible with CategoryGridHandler :: loadCategoryData ($ request, & $ categoryDataElement, $ filter = NULL) in /home/ojsaaot/public_html/ojs/lib/pkp/controllers/grid/users/stageParticipant/StageParticipantGridHandler.inc.php on line 24
[11-Jun-2018 14:02:42 UTC] PHP Warning: Declaration of PKPStageParticipantNotifyForm :: fetch ($ request) should be compatible with Form :: fetch ($ request, $ template = NULL, $ display = false) in / home / ojsaaot / public_html / ojs / lib / pkp / controllers / grid / users / stageParticipant / form / PKPStageParticipantNotifyForm.inc.php on line 19
[11-Jun-2018 14:02:42 UTC] PHP Warning: Declaration of PKPStageParticipantNotifyForm :: readInputData ($ request) should be compatible with Form :: readInputData () in / home / ojsaaot / public_html / ojs / lib / pkp / controllers / grid / users / stageParticipant / form / PKPStageParticipantNotifyForm.inc.php on line 19
[11-Jun-2018 14:02:42 UTC] PHP Warning: Declaration of PKPStageParticipantNotifyForm :: execute ($ request) should be compatible with Form :: execute () in / home / ojsaaot / public_html / ojs / lib / pkp / controllers / grid / users / stageParticipant / form / PKPStageParticipantNotifyForm.inc.php on line 19
[11-Jun-2018 14:02:42 UTC] PHP Warning: Declaration of AddParticipantForm :: readInputData () should be compatible with PKPStageParticipantNotifyForm :: readInputData ($ request) in / home / ojsaaot / public_html / ojs / lib / pkp / controllers / grid / users / stageParticipant / form / AddParticipantForm.inc.php on line 18
[11-Jun-2018 14:02:42 UTC] PHP Warning: Declaration of AddParticipantForm :: validate () should be compatible with Form :: validate ($ callHooks = true) in / home / ojsaaot / public_html / ojs / lib / pkp / controllers / grid / users / stageParticipant / form / AddParticipantForm.inc.php on line 18
[11-Jun-2018 14:02:42 UTC] PHP Deprecated: Non-static method PKPRequest :: getUserVar () should not be called statically in / home / ojsaaot / public_html / ojs / lib / pkp / classes / form / Form .inc.php on line 369
[11-Jun-2018 14:02:42 UTC] PHP Deprecated: Non-static method PKPRequest :: _ checkThis () should not be called statically in / home / ojsaaot / public_html / ojs / lib / pkp / classes / core / PKPRequest .inc.php on line 592

Thaks for help!

Hi @Matias_Vlahusic,

It looks like your server has ModSecurity running (which is fine), but it’s incorrectly interpreting a normal request as an attempted attack and blocking it (which is not). I’d suggest testing whether temporarily disabling ModSecurity resolves the problem, and if it does, consider adjusting the rules so that it’s not so trigger-happy.

Regards,
Alec Smecher
Public Knowledge Project Team

Hi @asmecher,

i have the same problem. I’m using OJS 3.1.0.1 with PHP 7.1.14.

The ModSecurity is safe mode?? I have disabled it in my server configuration.

However I am using cloudflare, can this be the error?

Thank you very much!

Hi @jmbarroso,

Unfortunately I can’t comment on specific hosts – every server will be a little different. Were you able to track down any relevant entries in your logs?

Regards,
Alec Smecher
Public Knowledge Project Team

Hi @asmecher!

Finally was a problem with cloudflare. I think most of my problems in OJS come by Cloudflare …

Thank you very much for the speed and support.

1 Like

So how did you solve the problem?

Dear @filipi,

i solved the problem purging the cache of everything in Cloudflare.

Regards.

it was finally resolved by disabling a ModSecurity rule that blocked a Blind SQL injection