I hereby claim:
- I am krlabs on github.
- I am krlaboratories (https://keybase.io/krlaboratories) on keybase.
- I have a public key ASCz3scgw584rCGr-R_IQtA3FB9wCFRNB7RAgyyeHzdPyQo
To claim this, I am signing this object:
import sys | |
import subprocess | |
exifs = [ | |
"ImageDescription", | |
"Make", | |
"Model", | |
"Software", | |
"Artist", | |
"Copyright", |
<?php | |
add_filter('wp_mail_smtp_custom_options', function( $phpmailer ) { | |
$phpmailer->SMTPOptions = array( | |
'ssl' => array( | |
'verify_peer' => false, | |
'verify_peer_name' => false, | |
'allow_self_signed' => true | |
) | |
); |
#! /usr/bin/env python | |
""" | |
Technical Explanation: https://blog.sucuri.net/2017/02/content-injection-vulnerability-wordpress-rest-api.html | |
REST API Wordpress reference: https://developer.wordpress.org/rest-api/reference/posts/#update-a-post | |
Wordpress Version Affected: 4.7.0/4.7.1 | |
2017 - Coded by snoww0lf. | |
""" | |
import re |
# Блокировка XSS | |
RewriteCond %{QUERY_STRING} (\<|%3C).*script.*(\>|%3E) [NC,OR] | |
# Блокируем выставление переменной PHP GLOBALS через URL | |
RewriteCond %{QUERY_STRING} GLOBALS(=|\[|\%[0-9A-Z]{0,2}) [OR] | |
# Блокируем возможность изменять переменную _REQUEST через URL | |
RewriteCond %{QUERY_STRING} _REQUEST(=|\[|\%[0-9A-Z]{0,2}) | |
# Блокировка MySQL инъекций, RFI, base64, и др. | |
RewriteCond %{QUERY_STRING} [a-zA-Z0-9_]=http:// [OR] | |
RewriteCond %{QUERY_STRING} [a-zA-Z0-9_]=(\.\.//?)+ [OR] |
I hereby claim:
To claim this, I am signing this object: