OK.. the above logging provides the clue of what the hacker / scanning tool is attempting:
GitHub - ab1gale/phpcms-2008-CVE-2018-19127
Quote:
Recently we found a vulnerability in /type.php of phpcms 2008 source code. When attackers send crafted requests like "/type.php?template=tag_(){};@unlink(FILE);assert($_POST[1]);{//../rss", evil content (in this case "@unlink(FILE);assert($_POST[1]);") will be written into cache file (in this case "/cache_template/rss.tpl.php") on phpcms 2008 website.
This does not effect our site since we do not run
phpcms; but it is still interesting to see the non-stop hacking attempts; so in this case it's not "a big deal".. just par for the course on the web.
It's never ending.... keeping a busy web site up and running smoothly.