我的WordPress通过受感染的.htaccess文件被黑客入侵,这是其内容,此htaccess的作用是什么?

问题描述 投票:1回答:1

在扫描客户端服务器的恶意软件后,我发现.htaccess文件感染了以下恶意软件:

SL-HTACCESS-GENERIC-ln.UNOFFICIAL    

这是.htaccess文件的内容:

# BEGIN WordPress
<IfModule mod_expires.c>
ExpiresActive On
ExpiresByType image/jpg "access plus 1 year"
ExpiresByType image/jpeg "access plus 1 year"
ExpiresByType image/gif "access plus 1 year"
ExpiresByType image/png "access plus 1 year"
ExpiresByType text/css "access plus 1 month"
ExpiresByType application/pdf "access plus 1 month"
ExpiresByType text/javascript "access plus 1 month"
ExpiresByType text/html "access plus 5 minutes"
ExpiresByType image/x-icon "access plus 1 year"
ExpiresDefault "access plus 6 hours"
</IfModule>
<ifModule mod_headers.c>
Header set X-Endurance-Cache-Level "2"
</ifModule>
<IfModule mod_rewrite.c>
RewriteEngine On
RewriteBase /
RewriteRule ^(denaturization)([0-9]+)-(.*)--a([0-9]+)\/(.*)$ ?denaturization$2=$4&%{QUERY_STRING}[L]
RewriteRule ^index\.php$ - [L]
RewriteCond %{REQUEST_FILENAME} !-f
RewriteCond %{REQUEST_FILENAME} !-d
RewriteRule . /index.php [L]
</IfModule>
# END WordPress
# php -- BEGIN cPanel-generated handler, do not edit
# Set the “ea-php73” package as the default “PHP” programming language.
<IfModule mime_module>
AddHandler application/x-httpd-ea-php73 .php .php7 .phtml
</IfModule>
# php -- END cPanel-generated handler, do not edit

有人可以告诉我此文件的功能以及删除此文件并将其替换为WordPress附带的原始htaccess的文件是否安全

提前谢谢您

regex wordpress .htaccess malware
1个回答
0
投票
RewriteRule ^(denaturization)([0-9]+)-(.*)--a([0-9]+)\/(.*)$ ?denaturization$2=$4&%{QUERY_STRING}[L]
© www.soinside.com 2019 - 2024. All rights reserved.