dedecms IIS7+ 防入侵加固

原创 wintop  2021-11-28 22:45:30  阅读 1641 次 评论 0 条
摘要:

dedecms 的漏洞可谓是很多,防不胜防。用IIS 7+ 的用户可按照下面的方式去做伪静态限制。把执行html的目录,data session目录,放到下面。这样就可以起到加固的作用,即便是被写入 php文件,入侵者也是无法执行php文件。<configuration> <system.webServer> <handlers accessPolicy="Read, Execute, Script" 

dedecms 的漏洞可谓是很多,防不胜防。用IIS 7+ 的用户可按照下面的方式去做伪静态限制。

把执行html目录,data session目录,放到下面。这样就可以起到加固的作用,即便是被写入 php文件,入侵者也是无法执行PHP文件。

<configuration>
<system.webServer>
<handlers accessPolicy="Read, Execute, Script" />
<rewrite>
<rules>
    <rule name="Block data" stopProcessing="true">
      <match url="^hangqing/(.*).php$" />
        <conditions logicalGrouping="MatchAny">
         <add input="{USER_AGENT}" pattern="data" />
         <add input="{REMOTE_ADDR}" pattern="" />
       </conditions>
      <action type="AbortRequest" />
    </rule>
    <rule name="Block templets" stopProcessing="true">
      <match url="^zhishi/(.*).php$" />
         <conditions logicalGrouping="MatchAny">
          <add input="{USER_AGENT}" pattern="templets" />
          <add input="{REMOTE_ADDR}" pattern="" />
        </conditions>
      <action type="AbortRequest" />
    </rule>
    <rule name="Block SomeRobot" stopProcessing="true">
       <match url="^news/(.*).php$" />
          <conditions logicalGrouping="MatchAny">
             <add input="{USER_AGENT}" pattern="SomeRobot" />
             <add input="{REMOTE_ADDR}" pattern="" />
          </conditions>
        <action type="AbortRequest" />
    </rule>
    <rule name="Block chanpin" stopProcessing="true">
       <match url="^chanpin/(.*).php$" />
          <conditions logicalGrouping="MatchAny">
             <add input="{USER_AGENT}" pattern="chanpin" />
             <add input="{REMOTE_ADDR}" pattern="" />
          </conditions>
        <action type="AbortRequest" />
    </rule>
    <rule name="Block lianxi" stopProcessing="true">
       <match url="^lianxi/(.*).php$" />
          <conditions logicalGrouping="MatchAny">
             <add input="{USER_AGENT}" pattern="lianxi" />
             <add input="{REMOTE_ADDR}" pattern="" />
          </conditions>
        <action type="AbortRequest" />
    </rule>
    <rule name="Block datAP" stopProcessing="true">
       <match url="^data/(.*).php$" />
          <conditions logicalGrouping="MatchAny">
             <add input="{USER_AGENT}" pattern="datap"/>
             <add input="{REMOTE_ADDR}" pattern="" />
          </conditions>
        <action type="AbortRequest" />
    </rule>
</rules>
</rewrite>
</system.webServer>
</configuration>


本文地址:http://zuoweng.com/post/131.html
版权声明:本文为原创文章,版权归 wintop 所有,欢迎分享本文,转载请保留出处!

发表评论


表情

还没有留言,还不快点抢沙发?