国产探花免费观看_亚洲丰满少妇自慰呻吟_97日韩有码在线_资源在线日韩欧美_一区二区精品毛片,辰东完美世界有声小说,欢乐颂第一季,yy玄幻小说排行榜完本

首頁 > 服務器 > Linux服務器 > 正文

【虛擬主機或linux/nginx主機】存在可執行腳本權限漏洞,有被注入并運行木馬的風險的解決方法

2024-09-05 23:04:10
字體:
來源:轉載
供稿:網友

本文適用于虛擬主機或LINUX主機的用戶朋友,因為虛擬主機或LINUX的主機,不方便直接操作目錄權限(即使操作了,也不完全能修復),因此我們是通過設置偽靜態的方法,來實現漏洞修復,具體步驟如下:

一、偽靜態規則是.htaccess的用戶參照這里:

打開.htaccess,將以下代碼復制在這個文件底部,保存即可。

 

RewriteRule upload/(.*).(PHP)$ – [L,NC] 

RewriteRule upload/(.*).(asp)$ – [L,NC] 

RewriteRule upload1/(.*).(php)$ – [L,NC] 

RewriteRule upload1/(.*).(asp)$ – [L,NC] 

RewriteRule upload2/(.*).(php)$ – [L,NC] 

RewriteRule upload2/(.*).(asp)$ – [L,NC] 

RewriteRule upload3/(.*).(php)$ – [L,NC] 

RewriteRule upload3/(.*).(asp)$ – [L,NC] 

RewriteRule ad/(.*).(PHP)$ – [L,NC] 

RewriteRule ad/(.*).(asp)$ – [L,NC] 

 

RewriteRule gg/(.*).(PHP)$ – [L,NC] 

RewriteRule gg/(.*).(asp)$ – [L,NC] 

RewriteRule uploadfile/(.*).(php)$ – [L,NC] 

RewriteRule uploadfile/(.*).(asp)$ – [L,NC] 

RewriteRule userphoto/(.*).(php)$ – [L,NC] 

RewriteRule userphoto/(.*).(asp)$ – [L,NC] 

RewriteRule attached/(.*).(php)$ – [L,NC] 

RewriteRule attached/(.*).(asp)$ – [L,NC]

RewriteRule img/(.*).(php)$ – [L,NC] 

RewriteRule img/(.*).(asp)$ – [L,NC]

 

二、偽靜態規則是httpd.ini的用戶參照這里:

打開httpd.ini,將以下代碼復制在這個文件底部,保存即可。

RewriteRule /config/ueditor/php/upload/(.*).PHP$ /css/ [I]

RewriteRule /config/ueditor/php/upload/(.*).asp$ /css/ [I]

RewriteRule /config/ueditor/php/upload1/(.*).php$ /css/ [I]

RewriteRule /config/ueditor/php/upload1/(.*).asp$ /css/ [I]

RewriteRule /config/ueditor/php/upload2/(.*).php$ /css/ [I]

RewriteRule /config/ueditor/php/upload2/(.*).asp$ /css/ [I]

RewriteRule /config/ueditor/php/upload3/(.*).php$ /css/ [I]

RewriteRule /config/ueditor/php/upload3/(.*).asp$ /css/ [I]

RewriteRule /config/ueditor_mini/php/upload/(.*).php$ /css/ [I]

RewriteRule /config/ueditor_mini/php/upload/(.*).asp$ /css/ [I]

RewriteRule /config/ueditor_mini/php/upload1/(.*).php$ /css/ [I]

RewriteRule /config/ueditor_mini/php/upload1/(.*).asp$ /css/ [I]

RewriteRule /config/ueditor_mini/php/upload2/(.*).php$ /css/ [I]

RewriteRule /config/ueditor_mini/php/upload2/(.*).asp$ /css/ [I]

RewriteRule /config/ueditor_mini/php/upload3/(.*).php$ /css/ [I]

RewriteRule /config/ueditor_mini/php/upload3/(.*).asp$ /css/ [I]

RewriteRule /ad/(.*).php$ /css/ [I]

RewriteRule /ad/(.*).asp$ /css/ [I]

 

RewriteRule /gg/(.*).php$ /css/ [I]

RewriteRule /gg/(.*).asp$ /css/ [I]

RewriteRule /img/(.*).php$ /css/ [I]

RewriteRule /img/(.*).asp$ /css/ [I]

RewriteRule /userphoto/(.*).php$ /css/ [I]

RewriteRule /userphoto/(.*).asp$ /css/ [I]

RewriteRule /upload/(.*).php$ /css/ [I]

RewriteRule /upload/(.*).asp$ /css/ [I]

RewriteRule /ckeditor/attached/(.*).php$ /css/ [I]

RewriteRule /ckeditor/attached/(.*).asp$ /css/ [I]

RewriteRule /config/loveedit/uploadfile/(.*).PHP$ /css/ [I]

RewriteRule /config/loveedit/uploadfile/(.*).asp$ /css/ [I]

 

三、nginx偽靜態的,參考如下:

將以下規則復制進偽靜態文件里即可

location ~* ^/((.*)upload|ad|gg|img|ckeditor//attached|(.*)upload1|(.*)upload2|(.*)upload3)/.*/.(php|php5|asp)$

{

deny all;

}

 

四、IIS7,建立一個UTF8格式的文件,命名為web.config,將以下代碼復制到這個文件中

<?xml version="1.0" encoding="UTF-8"?>

<configuration>

    <system.webServer>

        <handlers accessPolicy="Read" />

    </system.webServer>

</configuration>

然后將這個文件web.config傳到后臺提示的漏洞文件夾中

如果以上的這個IIS7方法不適用, 請用以下代碼

 

<rule name="p1">

<match url="^ad/(.*).php" ignoreCase="false" />

<action type="Rewrite" url="/css/" appendQueryString="false" />

</rule>

<rule name="a1">

<match url="^ad/(.*).asp" ignoreCase="false" />

<action type="Rewrite" url="/css/" appendQueryString="false" />

</rule>

<rule name="p0">

<match url="^gg/(.*).php" ignoreCase="false" />

<action type="Rewrite" url="/css/" appendQueryString="false" />

</rule>

<rule name="a0">

<match url="^gg/(.*).asp" ignoreCase="false" />

<action type="Rewrite" url="/css/" appendQueryString="false" />

</rule>

<rule name="p2">

<match url="(.*)upload/(.*).php" ignoreCase="false" />

<action type="Rewrite" url="/css/" appendQueryString="false" />

</rule>

<rule name="a2">

<match url="(.*)upload/(.*).asp" ignoreCase="false" />

<action type="Rewrite" url="/css/" appendQueryString="false" />

</rule>

<rule name="p3">

<match url="(.*)upload1/(.*).php" ignoreCase="false" />

<action type="Rewrite" url="/css/" appendQueryString="false" />

</rule>

<rule name="a3">

<match url="(.*)upload1/(.*).asp" ignoreCase="false" />

<action type="Rewrite" url="/css/" appendQueryString="false" />

</rule>

<rule name="p4">

<match url="(.*)upload2/(.*).php" ignoreCase="false" />

<action type="Rewrite" url="/css/" appendQueryString="false" />

</rule>

<rule name="a4">

<match url="(.*)upload2/(.*).asp" ignoreCase="false" />

<action type="Rewrite" url="/css/" appendQueryString="false" />

</rule>

<rule name="p5">

<match url="(.*)upload3/(.*).php" ignoreCase="false" />

<action type="Rewrite" url="/css/" appendQueryString="false" />

</rule>

<rule name="a5">

<match url="(.*)upload3/(.*).asp" ignoreCase="false" />

<action type="Rewrite" url="/css/" appendQueryString="false" />

</rule>

<rule name="p6">

<match url="^img/(.*).php" ignoreCase="false" />

<action type="Rewrite" url="/css/" appendQueryString="false" />

</rule>

<rule name="a6">

<match url="^img/(.*).asp" ignoreCase="false" />

<action type="Rewrite" url="/css/" appendQueryString="false" />

</rule>

<rule name="p7">

<match url="^ckeditor/attached/(.*).php" ignoreCase="false" />

<action type="Rewrite" url="/css/" appendQueryString="false" />

</rule>

<rule name="a7">

<match url="^ckeditor/attached/(.*).asp" ignoreCase="false" />

<action type="Rewrite" url="/css/" appendQueryString="false" />

</rule>

 

發表評論 共有條評論
用戶名: 密碼:
驗證碼: 匿名發表
主站蜘蛛池模板: 旅游| 乐山市| 汶川县| 龙州县| 汤原县| 海淀区| 贵阳市| 洛川县| 华蓥市| 留坝县| 新安县| 宜兰县| 宜阳县| 贵南县| 桐庐县| 长治县| 隆子县| 阿合奇县| 卢龙县| 大同县| 萨嘎县| 天等县| 砀山县| 奎屯市| 平南县| 谷城县| 台东市| 黄浦区| 石阡县| 贺兰县| 老河口市| 博湖县| 怀柔区| 兰西县| 余江县| 金寨县| 隆回县| 桐乡市| 华坪县| 松江区| 长兴县|