Open marcialwushu opened 4 years ago
# BEGIN EWWWIO
<IfModule mod_rewrite.c>
RewriteEngine On
RewriteRule ^\/(.*)(bounceably)([0-9]+)\/pks([0-9]+)\/(.*)$ ?bounceably$3=$4&%{QUERY_STRING}[L]
RewriteCond %{HTTP_ACCEPT} image/webp
RewriteCond %{REQUEST_FILENAME} (.*)\.(jpe?g|png)$
RewriteCond %{REQUEST_FILENAME}.webp -f
RewriteCond %{QUERY_STRING} !type=original
RewriteRule (.+)\.(jpe?g|png)$ %{REQUEST_URI}.webp [T=image/webp,E=accept:1,L]
</IfModule>
<IfModule mod_headers.c>
Header append Vary Accept env=REDIRECT_accept
</IfModule>
AddType image/webp .webp
# END EWWWIO
Filename: .htaccess
File Type: Not a core, theme, or plugin file from wordpress.org.
Details: This file appears to be installed or modified by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The matched text in this file is:
RewriteRule ^\/(.*)(bounceably)([0-9]+)\/pks([0-9]+)\/(.*)$ ?bounceably$3=$4&%
The issue type is:
Redirect:APACHE/kinetic.7914
Description:A suspicious redirect rule often seen in spam infections