linux木马盗取管理员权限,【虚拟主机或linux/nginx主机】存在可执行脚本权限漏洞,有被注入并运行木马的风险的解决方法...

本文适用于虚拟主机或LINUX主机的用户朋友,因为虚拟主机或LINUX的主机,不方便直接操作目录权限(即使操作了,也不完全能修复),因此我们是通过设置伪静态的方法,来实现漏洞修复,具体步骤如下:

一、伪静态规则是.htaccess的用户参照这里:

打开.htaccess,将以下代码复制在这个文件底部,保存即可。

RewriteRule upload/(.*).(PHP)$ – [L,NC]

RewriteRule upload/(.*).(asp)$ – [L,NC]

RewriteRule upload1/(.*).(php)$ – [L,NC]

RewriteRule upload1/(.*).(asp)$ – [L,NC]

RewriteRule upload2/(.*).(php)$ – [L,NC]

RewriteRule upload2/(.*).(asp)$ – [L,NC]

RewriteRule upload3/(.*).(php)$ – [L,NC]

RewriteRule upload3/(.*).(asp)$ – [L,NC]

RewriteRule ad/(.*).(PHP)$ – [L,NC]

RewriteRule ad/(.*).(asp)$ – [L,NC]

RewriteRule gg/(.*).(PHP)$ – [L,NC]

RewriteRule gg/(.*).(asp)$ – [L,NC]

RewriteRule uploadfile/(.*).(php)$ – [L,NC]

RewriteRule uploadfile/(.*).(asp)$ – [L,NC]

RewriteRule userphoto/(.*).(php)$ – [L,NC]

RewriteRule userphoto/(.*).(asp)$ – [L,NC]

RewriteRule attached/(.*).(php)$ – [L,NC]

RewriteRule attached/(.*).(asp)$ – [L,NC]

RewriteRule img/(.*).(php)$ – [L,NC]

RewriteRule img/(.*).(asp)$ – [L,NC]

RewriteRule homeimg/(.*).(php)$ – [L,NC]

RewriteRule homeimg/(.*).(asp)$ – [L,NC]

RewriteRule js/(.*).(php)$ – [L,NC]

RewriteRule js/(.*).(asp)$ – [L,NC]

RewriteRule css/(.*).(php)$ – [L,NC]

RewriteRule css/(.*).(asp)$ – [L,NC]

二、伪静态规则是httpd.ini的用户参照这里:

打开httpd.ini,将以下代码复制在这个文件底部,保存即可。

RewriteRule /config/ueditor/php/upload/(.*).PHP$ /css/ [I]

RewriteRule /config/ueditor/php/upload/(.*).asp$ /css/ [I]

RewriteRule /config/ueditor/php/upload1/(.*).php$ /css/ [I]

RewriteRule /config/ueditor/php/upload1/(.*).asp$ /css/ [I]

RewriteRule /config/ueditor/php/upload2/(.*).php$ /css/ [I]

RewriteRule /config/ueditor/php/upload2/(.*).asp$ /css/ [I]

RewriteRule /config/ueditor/php/upload3/(.*).php$ /css/ [I]

RewriteRule /config/ueditor/php/upload3/(.*).asp$ /css/ [I]

RewriteRule /config/ueditor_mini/php/upload/(.*).php$ /css/ [I]

RewriteRule /config/ueditor_mini/php/upload/(.*).asp$ /css/ [I]

RewriteRule /config/ueditor_mini/php/upload1/(.*).php$ /css/ [I]

RewriteRule /config/ueditor_mini/php/upload1/(.*).asp$ /css/ [I]

RewriteRule /config/ueditor_mini/php/upload2/(.*).php$ /css/ [I]

RewriteRule /config/ueditor_mini/php/upload2/(.*).asp$ /css/ [I]

RewriteRule /config/ueditor_mini/php/upload3/(.*).php$ /css/ [I]

RewriteRule /config/ueditor_mini/php/upload3/(.*).asp$ /css/ [I]

RewriteRule /ad/(.*).php$ /css/ [I]

RewriteRule /ad/(.*).asp$ /css/ [I]

RewriteRule /js/(.*).php$ /css/ [I]

RewriteRule /js/(.*).asp$ /css/ [I]

RewriteRule /homeimg/(.*).php$ /css/ [I]

RewriteRule /homeimg/(.*).asp$ /css/ [I]

RewriteRule /css/(.*).php$ /css/ [I]

RewriteRule /css/(.*).asp$ /css/ [I]

RewriteRule /gg/(.*).php$ /css/ [I]

RewriteRule /gg/(.*).asp$ /css/ [I]

RewriteRule /img/(.*).php$ /css/ [I]

RewriteRule /img/(.*).asp$ /css/ [I]

RewriteRule /userphoto/(.*).php$ /css/ [I]

RewriteRule /userphoto/(.*).asp$ /css/ [I]

RewriteRule /upload/(.*).php$ /css/ [I]

RewriteRule /upload/(.*).asp$ /css/ [I]

RewriteRule /ckeditor/attached/(.*).php$ /css/ [I]

RewriteRule /ckeditor/attached/(.*).asp$ /css/ [I]

RewriteRule /config/loveedit/uploadfile/(.*).PHP$ /css/ [I]

RewriteRule /config/loveedit/uploadfile/(.*).asp$ /css/ [I]

三、nginx伪静态的,参考如下:

将以下规则复制进伪静态文件里即可

location ~* ^/((.*)upload|ad|gg|img|homeimg|js|css|ckeditor\/attached|(.*)upload1|(.*)upload2|(.*)upload3)/.*\.(php|php5|asp)$

{

deny all;

}

四、IIS7,建立一个UTF8格式的文件,命名为web.config,将以下代码复制到这个文件中

然后将这个文件web.config传到后台提示的漏洞文件夹中

如果以上的这个IIS7方法不适用, 请用以下代码

  • 0
    点赞
  • 1
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值