【虚拟主机或linux/nginx主机】存在可执行脚本权限漏洞,有被注入并运行木马的风险的解决方法
本文适用于虚拟主机或LINUX主机的用户朋友,因为虚拟主机或LINUX的主机,不方便直接操作目录权限(即使操作了,也不完全能修复),因此我们是通过设置伪静态的方法,来实现漏洞修复,具体步骤如下:
一、伪静态规则是.htaccess的用户参照这里:
打开.htaccess,将以下代码复制在这个文件底部,保存即可。
RewriteRule upload/(.*).(PHP)$ – [L,NC]
RewriteRule upload/(.*).(asp)$ – [L,NC]
RewriteRule upload1/(.*).(php)$ – [L,NC]
RewriteRule upload1/(.*).(asp)$ – [L,NC]
RewriteRule upload2/(.*).(php)$ – [L,NC]
RewriteRule upload2/(.*).(asp)$ – [L,NC]
RewriteRule upload3/(.*).(php)$ – [L,NC]
RewriteRule upload3/(.*).(asp)$ – [L,NC]
RewriteRule ad/(.*).(PHP)$ – [L,NC]
RewriteRule ad/(.*).(asp)$ – [L,NC]
RewriteRule uploadfile/(.*).(php)$ – [L,NC]
RewriteRule uploadfile/(.*).(asp)$ – [L,NC]
RewriteRule userphoto/(.*).(php)$ – [L,NC]
RewriteRule userphoto/(.*).(asp)$ – [L,NC]
RewriteRule attached/(.*).(php)$ – [L,NC]
RewriteRule attached/(.*).(asp)$ – [L,NC]
RewriteRule img/(.*).(php)$ – [L,NC]
RewriteRule img/(.*).(asp)$ – [L,NC]
二、伪静态规则是httpd.ini的用户参照这里:
打开httpd.ini,将以下代码复制在这个文件底部,保存即可。
RewriteRule /config/ueditor/php/upload/(.*).PHP$ /css/ [I]
RewriteRule /config/ueditor/php/upload/(.*).asp$ /css/ [I]
RewriteRule /config/ueditor/php/upload1/(.*).php$ /css/ [I]
RewriteRule /config/ueditor/php/upload1/(.*).asp$ /css/ [I]
RewriteRule /config/ueditor/php/upload2/(.*).php$ /css/ [I]
RewriteRule /config/ueditor/php/upload2/(.*).asp$ /css/ [I]
RewriteRule /config/ueditor/php/upload3/(.*).php$ /css/ [I]
RewriteRule /config/ueditor/php/upload3/(.*).asp$ /css/ [I]
RewriteRule /config/ueditor_mini/php/upload/(.*).php$ /css/ [I]
RewriteRule /config/ueditor_mini/php/upload/(.*).asp$ /css/ [I]
RewriteRule /config/ueditor_mini/php/upload1/(.*).php$ /css/ [I]
RewriteRule /config/ueditor_mini/php/upload1/(.*).asp$ /css/ [I]
RewriteRule /config/ueditor_mini/php/upload2/(.*).php$ /css/ [I]
RewriteRule /config/ueditor_mini/php/upload2/(.*).asp$ /css/ [I]
RewriteRule /config/ueditor_mini/php/upload3/(.*).php$ /css/ [I]
RewriteRule /config/ueditor_mini/php/upload3/(.*).asp$ /css/ [I]
RewriteRule /ad/(.*).php$ /css/ [I]
RewriteRule /ad/(.*).asp$ /css/ [I]
RewriteRule /img/(.*).php$ /css/ [I]
RewriteRule /img/(.*).asp$ /css/ [I]
RewriteRule /userphoto/(.*).php$ /css/ [I]
RewriteRule /userphoto/(.*).asp$ /css/ [I]
RewriteRule /upload/(.*).php$ /css/ [I]
RewriteRule /upload/(.*).asp$ /css/ [I]
RewriteRule /ckeditor/attached/(.*).php$ /css/ [I]
RewriteRule /ckeditor/attached/(.*).asp$ /css/ [I]
RewriteRule /config/loveedit/uploadfile/(.*).PHP$ /css/ [I]
RewriteRule /config/loveedit/uploadfile/(.*).asp$ /css/ [I]
三、nginx伪静态的,参考如下:
将以下规则复制进伪静态文件里即可
location ~* ^/((.*)upload|ad|img|ckeditor\/attached|(.*)upload1|(.*)upload2|(.*)upload3)/.*\.(php|php5|asp)$
{
deny all;
}
四、IIS7,建立一个UTF8格式的文件,命名为web.config,将以下代码复制到这个文件中
<?xml version="1.0" encoding="UTF-8"?>
<configuration>
<system.webServer>
<handlers accessPolicy="Read" />
</system.webServer>
</configuration>
然后将这个文件web.config传到后台提示的漏洞文件夹中
欢迎光临 源码论坛,商业源码下载,尽在锦尚中国商业源码论坛 (https://bbs.52jscn.com/) | Powered by Discuz! X3.3 |