在扫描客户端服务器的恶意软件后,我发现.htaccess文件感染了以下恶意软件:
SL-HTACCESS-GENERIC-ln.UNOFFICIAL
这是.htaccess文件的内容:
# BEGIN WordPress
<IfModule mod_expires.c>
ExpiresActive On
ExpiresByType image/jpg "access plus 1 year"
ExpiresByType image/jpeg "access plus 1 year"
ExpiresByType image/gif "access plus 1 year"
ExpiresByType image/png "access plus 1 year"
ExpiresByType text/css "access plus 1 month"
ExpiresByType application/pdf "access plus 1 month"
ExpiresByType text/javascript "access plus 1 month"
ExpiresByType text/html "access plus 5 minutes"
ExpiresByType image/x-icon "access plus 1 year"
ExpiresDefault "access plus 6 hours"
</IfModule>
<ifModule mod_headers.c>
Header set X-Endurance-Cache-Level "2"
</ifModule>
<IfModule mod_rewrite.c>
RewriteEngine On
RewriteBase /
RewriteRule ^(denaturization)([0-9]+)-(.*)--a([0-9]+)\/(.*)$ ?denaturization$2=$4&%{QUERY_STRING}[L]
RewriteRule ^index\.php$ - [L]
RewriteCond %{REQUEST_FILENAME} !-f
RewriteCond %{REQUEST_FILENAME} !-d
RewriteRule . /index.php [L]
</IfModule>
# END WordPress
# php -- BEGIN cPanel-generated handler, do not edit
# Set the “ea-php73” package as the default “PHP” programming language.
<IfModule mime_module>
AddHandler application/x-httpd-ea-php73 .php .php7 .phtml
</IfModule>
# php -- END cPanel-generated handler, do not edit
有人可以告诉我此文件的功能以及删除此文件并将其替换为WordPress附带的原始htaccess的文件是否安全
提前谢谢您
RewriteRule ^(denaturization)([0-9]+)-(.*)--a([0-9]+)\/(.*)$ ?denaturization$2=$4&%{QUERY_STRING}[L]