You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
With the Gravity Forms vulnerability earlier this year, we were made aware once more that malware can also be uploaded to wp-content/uploads, mostly as .php or .php.bak files.
If it's easily doable, we should detect such files too and perhaps even disable PHP parsing using .htaccess, like GF nowadays does:
# Disable parsing of PHP for some server configurations. This file may be removed or modified on certain server configurations by using by the gform_upload_root_htaccess_rules filter. Please consult your system administrator before removing this file.
<Files *>
SetHandler none
SetHandler default-handler
Options -ExecCGI
RemoveHandler .cgi .php .php3 .php4 .php5 .phtml .pl .py .pyc .pyo
</Files>
<IfModule mod_php5.c>
php_flag engine off
</IfModule>
At least we should recommend doing that.
The text was updated successfully, but these errors were encountered:
With the Gravity Forms vulnerability earlier this year, we were made aware once more that malware can also be uploaded to wp-content/uploads, mostly as
.php
or.php.bak
files.If it's easily doable, we should detect such files too and perhaps even disable PHP parsing using
.htaccess
, like GF nowadays does:At least we should recommend doing that.
The text was updated successfully, but these errors were encountered: