Bypass PHP file execution restriction
-
Sucuri Security WordPress plug-in PHP execution hardening bypass:
Some of the hardening points include stopping execution of PHP files in wp-content and uploads directory. For this .htaccess file is created with following content:
<Files *.php>
Order deny,allow
Deny for all
<Files>This entry stops you from executing uploaded PHP files from uploads directory.
It means if you upload a file “shell.php” then you cannot execute it.But if you upload a file “shell.PHP” or “shell.pHp” then it will work.
Issue is due to case-sensitive entry in .htaccess file. This issue can be exploited to bypass PHP execution restriction protection and execute PHP files.
The topic ‘Bypass PHP file execution restriction’ is closed to new replies.