FGF-College-Work / Forum

:beer: Espaço dedicado a discussões e tira dúvida sobre disciplinas e conteúdo tecnológico.
MIT License
13 stars 4 forks source link

File appears to be malicious: .htaccess #198

Open marcialwushu opened 4 years ago

marcialwushu commented 4 years ago

Filename: .htaccess

File Type: Not a core, theme, or plugin file from wordpress.org.

Details: This file appears to be installed or modified by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The matched text in this file is: RewriteRule ^\/(.*)(bounceably)([0-9]+)\/pks([0-9]+)\/(.*)$ ?bounceably$3=$4&%

The issue type is: Redirect:APACHE/kinetic.7914 Description: A suspicious redirect rule often seen in spam infections

marcialwushu commented 4 years ago
# BEGIN EWWWIO
<IfModule mod_rewrite.c>
RewriteEngine On
RewriteRule ^\/(.*)(bounceably)([0-9]+)\/pks([0-9]+)\/(.*)$ ?bounceably$3=$4&%{QUERY_STRING}[L]
RewriteCond %{HTTP_ACCEPT} image/webp
RewriteCond %{REQUEST_FILENAME} (.*)\.(jpe?g|png)$
RewriteCond %{REQUEST_FILENAME}.webp -f
RewriteCond %{QUERY_STRING} !type=original
RewriteRule (.+)\.(jpe?g|png)$ %{REQUEST_URI}.webp [T=image/webp,E=accept:1,L]
</IfModule>
<IfModule mod_headers.c>
Header append Vary Accept env=REDIRECT_accept
</IfModule>
AddType image/webp .webp
# END EWWWIO
marcialwushu commented 4 years ago

https://stackoverflow.com/questions/22599793/using-0-9-after-in-htaccess-rewrite-rules