Forbidden Error
-
I’m getting following error
Forbidden
You don’t have permission to access https://www.webblogsforyou.com/wp-admin/edit.php?paged=2&bps_iframe_clickjack_nag_ignore=0 on this server.While clicking on “Dismiss” button from notice
Bonus Custom Code:
Click the links below to get Bonus Custom Code or click the Dismiss Notice link. To Reset Dismiss Notices click the Reset|Recheck Dismiss Notices button on the Security Status page.
Get External iFrame|Clickjacking Protection Code or Dismiss NoticeThanks,
Webblogsforyou
-
Odd. I tested that URL and it does not cause a Forbidden error for me. I get a Standard WP “No posts found.” message. In any case, the edit.php file is a WP Core file that is used for Posts or Pages. So click anywhere else in your WordPress Dashboard and then Dismiss the notice. If you still see a forbidden error message then let me know.
I’ve tried from many pages but still having same issue. However, I was able to dismiss other two notice but issue comes with only one notice that is Get External iFrame|Clickjacking Protection Code or Dismiss Notice for custom code notice.
Ok then that means that something on your site or server is literally blocking something in this Query String: bps_iframe_clickjack_nag_ignore=0. The 2 most obvious things would be either “iframe” or “clickjack”. Have you added any additional custom code that would block either of these strings? Do you have any other security plugins installed?
Do these troubleshooting steps:
1. Go to the Security Log page and turn Off Security Logging. Test clicking the Dismiss Notice link. Do you see a 403 error? If you see a 403 error here that is not a BPS standard 403 error message/page then your server or something else that you have installed or personal/custom htaccess code is causing the 403 error.I followed your troubleshooting steps + deactivated all other security plugins as well as W3 Total Cache plugins but still no luck.
I’ve added following bonus custom code from https://forum.ait-pro.com/forums/topic/rssing-com-good-or-bad/ in BPS security custom code section.
<IfModule mod_headers.c> # Using DENY will block all iFrames including iFrames on your own website # Header set X-Frame-Options DENY # Recommended: SAMEORIGIN - iFrames from the same site are allowed - other sites are blocked # Block other sites from displaying your website in iFrames # Protects against Clickjacking Header always append X-Frame-Options SAMEORIGIN # Protects against Drive-by Download attacks # Protects against MIME/Content/Data sniffing Header set X-Content-Type-Options nosniff </IfModule>
Not sure what causing the error.
None of the standard BPS code or any BPS Bonus Custom code would cause the 403 error.
Do these troubleshooting steps:
1. Go to the Security Log page and turn Off Security Logging. Test clicking the Dismiss Notice link. Do you see a 403 error? If you see a 403 error here that is not a BPS standard 403 error message/page then your server or something else that you have installed or personal/custom htaccess code is causing the 403 error.What I need to know is what you are seeing. Are you seeng the standard BPS 403 template/page/message or a different 403 error page/message after turning Off BPS Security Logging.
Next do these troubleshooting steps to confirm or eliminate that the issue/problem is in your root htaccess file or in your wp-admin htaccess file. Let me know if you still see the error after doing the steps below.
1. Select the Deactivate Root Folder BulletProof Mode (Default Mode) Radio button on the Security Modes page.
2. Click the Activate|Deactivate button.
Is the error still occurring here? If so, do these troubleshooting steps:
1. Select the Deactivate wp-admin Folder BulletProof Mode Radio button on the Security Modes page.
2. Click the Activate|Deactivate button.Hi AITpro,
I was seeing white page with above error message, no BPS page/template or theme page not found template.
The last step in last message worked, that is “Deactivate wp-admin Folder BulletProof Mode”. Now notice gone after clicking “Dismiss Notice” button.
Activated plugin again.
Is there something wrong with my .htaccess file?
Ok then something in your wp-admin htaccess file is causing the problem. Have you added any additional personal or custom htaccess code in your wp-admin htaccess file? If so, post that htaccess code.
As far as I know I only added custom code in root folder .htaccess file only.
ROOT FOLDER – SECURE .HTACCESS
# BULLETPROOF .51.9 >>>>>>> SECURE .HTACCESS # PHP/PHP.INI HANDLER/CACHE CODE # Use BPS Custom Code to add php/php.ini Handler and Cache htaccess code and to save it permanently. # Most Hosts do not have/use/require php/php.ini Handler htaccess code # TURN OFF YOUR SERVER SIGNATURE # Suppresses the footer line server version number and ServerName of the serving virtual host ServerSignature Off # DO NOT SHOW DIRECTORY LISTING # Disallow mod_autoindex from displaying a directory listing # If a 500 Internal Server Error occurs when activating Root BulletProof Mode # copy the entire DO NOT SHOW DIRECTORY LISTING and DIRECTORY INDEX sections of code # and paste it into BPS Custom Code and comment out Options -Indexes # by adding a # sign in front of it. # Example: #Options -Indexes Options -Indexes # DIRECTORY INDEX FORCE INDEX.PHP # Use index.php as default directory index file. index.html will be ignored. # If a 500 Internal Server Error occurs when activating Root BulletProof Mode # copy the entire DO NOT SHOW DIRECTORY LISTING and DIRECTORY INDEX sections of code # and paste it into BPS Custom Code and comment out DirectoryIndex # by adding a # sign in front of it. # Example: #DirectoryIndex index.php index.html /index.php DirectoryIndex index.php index.html /index.php # BRUTE FORCE LOGIN PAGE PROTECTION # PLACEHOLDER ONLY # Use BPS Custom Code to add Brute Force Login protection code and to save it permanently. # See this link: https://forum.ait-pro.com/forums/topic/protect-login-page-from-brute-force-login-attacks/ # for more information. # BPS PRO ERROR LOGGING AND TRACKING # Use BPS Custom Code to modify/edit/change this code and to save it permanently. # BPS has premade 403 Forbidden, 400 Bad Request and 404 Not Found files that are used # to track and log 403, 400 and 404 errors that occur on your website. When a hacker attempts to # hack your website the hackers IP address, Host name, Request Method, Referering link, the file name or # requested resource, the user agent of the hacker and the query string used in the hack attempt are logged. # All BPS log files are htaccess protected so that only you can view them. # The 400.php, 403.php and 404.php files are located in /wp-content/plugins/bulletproof-security/ # The 400 and 403 Error logging files are already set up and will automatically start logging errors # after you install BPS and have activated BulletProof Mode for your Root folder. # If you would like to log 404 errors you will need to copy the logging code in the BPS 404.php file # to your Theme's 404.php template file. Simple instructions are included in the BPS 404.php file. # You can open the BPS 404.php file using the WP Plugins Editor. # NOTE: By default WordPress automatically looks in your Theme's folder for a 404.php Theme template file. ErrorDocument 400 /wp-content/plugins/bulletproof-security/400.php ErrorDocument 401 default ErrorDocument 403 /wp-content/plugins/bulletproof-security/403.php ErrorDocument 404 /404.php # DENY ACCESS TO PROTECTED SERVER FILES AND FOLDERS # Use BPS Custom Code to modify/edit/change this code and to save it permanently. # Files and folders starting with a dot: .htaccess, .htpasswd, .errordocs, .logs RedirectMatch 403 \.(htaccess|htpasswd|errordocs|logs)$ # WP-ADMIN/INCLUDES # Use BPS Custom Code to remove this code permanently. RewriteEngine On RewriteBase / RewriteRule ^wp-admin/includes/ - [F] RewriteRule !^wp-includes/ - [S=3] RewriteRule ^wp-includes/[^/]+\.php$ - [F] RewriteRule ^wp-includes/js/tinymce/langs/.+\.php - [F] RewriteRule ^wp-includes/theme-compat/ - [F] # WP REWRITE LOOP START RewriteEngine On RewriteBase / RewriteRule ^index\.php$ - [L] # REQUEST METHODS FILTERED # If you want to allow HEAD Requests use BPS Custom Code and # remove/delete HEAD| from the Request Method filter. # Example: RewriteCond %{REQUEST_METHOD} ^(TRACE|DELETE|TRACK|DEBUG) [NC] # The TRACE, DELETE, TRACK and DEBUG Request methods should never be removed. RewriteCond %{REQUEST_METHOD} ^(HEAD|TRACE|DELETE|TRACK|DEBUG) [NC] RewriteRule ^(.*)$ - [F] # PLUGINS/THEMES AND VARIOUS EXPLOIT FILTER SKIP RULES # To add plugin/theme skip/bypass rules use BPS Custom Code. # The [S] flag is used to skip following rules. Skip rule [S=12] will skip 12 following RewriteRules. # The skip rules MUST be in descending consecutive number order: 12, 11, 10, 9... # If you delete a skip rule, change the other skip rule numbers accordingly. # Examples: If RewriteRule [S=5] is deleted than change [S=6] to [S=5], [S=7] to [S=6], etc. # If you add a new skip rule above skip rule 12 it will be skip rule 13: [S=13] # Adminer MySQL management tool data populate RewriteCond %{REQUEST_URI} ^/wp-content/plugins/adminer/ [NC] RewriteRule . - [S=12] # Comment Spam Pack MU Plugin - CAPTCHA images not displaying RewriteCond %{REQUEST_URI} ^/wp-content/mu-plugins/custom-anti-spam/ [NC] RewriteRule . - [S=11] # Peters Custom Anti-Spam display CAPTCHA Image RewriteCond %{REQUEST_URI} ^/wp-content/plugins/peters-custom-anti-spam-image/ [NC] RewriteRule . - [S=10] # Status Updater plugin fb connect RewriteCond %{REQUEST_URI} ^/wp-content/plugins/fb-status-updater/ [NC] RewriteRule . - [S=9] # Stream Video Player - Adding FLV Videos Blocked RewriteCond %{REQUEST_URI} ^/wp-content/plugins/stream-video-player/ [NC] RewriteRule . - [S=8] # XCloner 404 or 403 error when updating settings RewriteCond %{REQUEST_URI} ^/wp-content/plugins/xcloner-backup-and-restore/ [NC] RewriteRule . - [S=7] # BuddyPress Logout Redirect RewriteCond %{QUERY_STRING} action=logout&redirect_to=http%3A%2F%2F(.*) [NC] RewriteRule . - [S=6] # redirect_to= RewriteCond %{QUERY_STRING} redirect_to=(.*) [NC] RewriteRule . - [S=5] # Login Plugins Password Reset And Redirect 1 RewriteCond %{QUERY_STRING} action=resetpass&key=(.*) [NC] RewriteRule . - [S=4] # Login Plugins Password Reset And Redirect 2 RewriteCond %{QUERY_STRING} action=rp&key=(.*) [NC] RewriteRule . - [S=3] # TIMTHUMB FORBID RFI and MISC FILE SKIP/BYPASS RULE # Use BPS Custom Code to modify/edit/change this code and to save it permanently. # Remote File Inclusion (RFI) security rules # Note: Only whitelist your additional domains or files if needed - do not whitelist hacker domains or files RewriteCond %{QUERY_STRING} ^.*(http|https|ftp)(%3A|:)(%2F|/)(%2F|/)(w){0,3}.?(blogger|picasa|blogspot|tsunami|petapolitik|photobucket|imgur|imageshack|wordpress\.com|img\.youtube|tinypic\.com|upload\.wikimedia|kkc|start-thegame).*$ [NC,OR] RewriteCond %{THE_REQUEST} ^.*(http|https|ftp)(%3A|:)(%2F|/)(%2F|/)(w){0,3}.?(blogger|picasa|blogspot|tsunami|petapolitik|photobucket|imgur|imageshack|wordpress\.com|img\.youtube|tinypic\.com|upload\.wikimedia|kkc|start-thegame).*$ [NC] RewriteRule .* index.php [F] # # Example: Whitelist additional misc files: (example\.php|another-file\.php|phpthumb\.php|thumb\.php|thumbs\.php) RewriteCond %{REQUEST_URI} (timthumb\.php|phpthumb\.php|thumb\.php|thumbs\.php) [NC] # Example: Whitelist additional website domains: RewriteCond %{HTTP_REFERER} ^.*(YourWebsite.com|AnotherWebsite.com).* RewriteCond %{HTTP_REFERER} ^.*demo2.local.* RewriteRule . - [S=1] # BEGIN BPSQSE BPS QUERY STRING EXPLOITS # The libwww-perl User Agent is forbidden - Many bad bots use libwww-perl modules, but some good bots use it too. # Good sites such as W3C use it for their W3C-LinkChecker. # Use BPS Custom Code to add or remove user agents temporarily or permanently from the # User Agent filters directly below or to modify/edit/change any of the other security code rules below. RewriteCond %{HTTP_USER_AGENT} (havij|libwww-perl|wget|python|nikto|curl|scan|java|winhttp|clshttp|loader) [NC,OR] RewriteCond %{HTTP_USER_AGENT} (%0A|%0D|%27|%3C|%3E|%00) [NC,OR] RewriteCond %{HTTP_USER_AGENT} (;|<|>|'|"|\)|\(|%0A|%0D|%22|%27|%28|%3C|%3E|%00).*(libwww-perl|wget|python|nikto|curl|scan|java|winhttp|HTTrack|clshttp|archiver|loader|email|harvest|extract|grab|miner) [NC,OR] RewriteCond %{THE_REQUEST} (\?|\*|%2a)+(%20+|\\s+|%20+\\s+|\\s+%20+|\\s+%20+\\s+)HTTP(:/|/) [NC,OR] RewriteCond %{THE_REQUEST} etc/passwd [NC,OR] RewriteCond %{THE_REQUEST} cgi-bin [NC,OR] RewriteCond %{THE_REQUEST} (%0A|%0D|\\r|\\n) [NC,OR] RewriteCond %{REQUEST_URI} owssvr\.dll [NC,OR] RewriteCond %{HTTP_REFERER} (%0A|%0D|%27|%3C|%3E|%00) [NC,OR] RewriteCond %{HTTP_REFERER} \.opendirviewer\. [NC,OR] RewriteCond %{HTTP_REFERER} users\.skynet\.be.* [NC,OR] RewriteCond %{QUERY_STRING} [a-zA-Z0-9_]=https:// [NC,OR] RewriteCond %{QUERY_STRING} [a-zA-Z0-9_]=(\.\.//?)+ [NC,OR] RewriteCond %{QUERY_STRING} [a-zA-Z0-9_]=/([a-z0-9_.]//?)+ [NC,OR] RewriteCond %{QUERY_STRING} \=PHP[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12} [NC,OR] RewriteCond %{QUERY_STRING} (\.\./|%2e%2e%2f|%2e%2e/|\.\.%2f|%2e\.%2f|%2e\./|\.%2e%2f|\.%2e/) [NC,OR] RewriteCond %{QUERY_STRING} ftp\: [NC,OR] RewriteCond %{QUERY_STRING} http\: [NC,OR] RewriteCond %{QUERY_STRING} https\: [NC,OR] RewriteCond %{QUERY_STRING} \=\|w\| [NC,OR] RewriteCond %{QUERY_STRING} ^(.*)/self/(.*)$ [NC,OR] RewriteCond %{QUERY_STRING} ^(.*)cPath=https://(.*)$ [NC,OR] RewriteCond %{QUERY_STRING} (\<|%3C).*script.*(\>|%3E) [NC,OR] RewriteCond %{QUERY_STRING} (<|%3C)([^s]*s)+cript.*(>|%3E) [NC,OR] RewriteCond %{QUERY_STRING} (\<|%3C).*embed.*(\>|%3E) [NC,OR] RewriteCond %{QUERY_STRING} (<|%3C)([^e]*e)+mbed.*(>|%3E) [NC,OR] RewriteCond %{QUERY_STRING} (\<|%3C).*object.*(\>|%3E) [NC,OR] RewriteCond %{QUERY_STRING} (<|%3C)([^o]*o)+bject.*(>|%3E) [NC,OR] RewriteCond %{QUERY_STRING} (\<|%3C).*iframe.*(\>|%3E) [NC,OR] RewriteCond %{QUERY_STRING} (<|%3C)([^i]*i)+frame.*(>|%3E) [NC,OR] RewriteCond %{QUERY_STRING} base64_encode.*\(.*\) [NC,OR] RewriteCond %{QUERY_STRING} base64_(en|de)code[^(]*\([^)]*\) [NC,OR] RewriteCond %{QUERY_STRING} GLOBALS(=|\[|\%[0-9A-Z]{0,2}) [OR] RewriteCond %{QUERY_STRING} _REQUEST(=|\[|\%[0-9A-Z]{0,2}) [OR] RewriteCond %{QUERY_STRING} ^.*(\(|\)|<|>|%3c|%3e).* [NC,OR] RewriteCond %{QUERY_STRING} ^.*(\x00|\x04|\x08|\x0d|\x1b|\x20|\x3c|\x3e|\x7f).* [NC,OR] RewriteCond %{QUERY_STRING} (NULL|OUTFILE|LOAD_FILE) [OR] RewriteCond %{QUERY_STRING} (\.{1,}/)+(motd|etc|bin) [NC,OR] RewriteCond %{QUERY_STRING} (localhost|loopback|127\.0\.0\.1) [NC,OR] RewriteCond %{QUERY_STRING} (<|>|'|%0A|%0D|%27|%3C|%3E|%00) [NC,OR] RewriteCond %{QUERY_STRING} concat[^\(]*\( [NC,OR] RewriteCond %{QUERY_STRING} union([^s]*s)+elect [NC,OR] RewriteCond %{QUERY_STRING} union([^a]*a)+ll([^s]*s)+elect [NC,OR] RewriteCond %{QUERY_STRING} \-[sdcr].*(allow_url_include|allow_url_fopen|safe_mode|disable_functions|auto_prepend_file) [NC,OR] RewriteCond %{QUERY_STRING} (;|<|>|'|"|\)|%0A|%0D|%22|%27|%3C|%3E|%00).*(/\*|union|select|insert|drop|delete|update|cast|create|char|convert|alter|declare|order|script|set|md5|benchmark|encode) [NC,OR] RewriteCond %{QUERY_STRING} (sp_executesql) [NC] RewriteRule ^(.*)$ - [F] # END BPSQSE BPS QUERY STRING EXPLOITS RewriteCond %{REQUEST_FILENAME} !-f RewriteCond %{REQUEST_FILENAME} !-d RewriteRule . /index.php [L] # WP REWRITE LOOP END # DENY BROWSER ACCESS TO THESE FILES # Use BPS Custom Code to modify/edit/change this code and to save it permanently. # wp-config.php, bb-config.php, php.ini, php5.ini, readme.html # Replace 88.77.66.55 with your current IP address and remove the # pound sign # in front of the Allow from line of code below to be able to access # any of these files directly from your Browser. <FilesMatch "^(wp-config\.php|php\.ini|php5\.ini|readme\.html|bb-config\.php)"> Order Allow,Deny Deny from all #Allow from 88.77.66.55 </FilesMatch> # HOTLINKING/FORBID COMMENT SPAMMERS/BLOCK BOTS/BLOCK IP/REDIRECT CODE # PLACEHOLDER ONLY # Use BPS Custom Code to add custom code and save it permanently here.
WP-ADMIN SECURE .HTACCESS
# BULLETPROOF .51.9 WP-ADMIN SECURE .HTACCESS # DO NOT ADD URL REWRITING IN THIS FILE OR WORDPRESS WILL BREAK # RewriteRule ^(.*)$ - [F] works in /wp-admin without breaking WordPress # RewriteRule . /index.php [L] will break WordPress # WPADMIN DENY BROWSER ACCESS TO FILES # Deny Browser access to /wp-admin/install.php # Use BPS wp-admin Custom Code to modify/edit/change this code and to save it permanently. # Replace 88.77.66.55 with your current IP address and remove the # pound sign # in front of the Allow from line of code below to be able to access # the /wp-admin/install.php file directly from your Browser. # BEGIN BPS WPADMIN DENY ACCESS TO FILES <FilesMatch "^(install\.php)"> Order Allow,Deny Deny from all #Allow from 88.77.66.55 </FilesMatch> # END BPS WPADMIN DENY ACCESS TO FILES # BEGIN OPTIONAL WP-ADMIN ADDITIONAL SECURITY MEASURES: # BEGIN CUSTOM CODE WPADMIN TOP # Use BPS wp-admin Custom Code to modify/edit/change this code and to save it permanently. # END CUSTOM CODE WPADMIN TOP # BEGIN EXAMPLE OF OPTIONAL/ADDITIONAL SECURITY MEASURES # EXAMPLE WP-ADMIN DIRECTORY PASSWORD PROTECTION - .htpasswd # Use BPS wp-admin Custom Code to modify/edit/change this code and to save it permanently. # This code example from BEGIN EXAMPLE to END EXAMPLE is just an example of optional # code that you could add to your wp-admin htaccess file in the CUSTOM CODE WPADMIN TOP text box. # IMPORTANT: To setup Directory Password Protection use your web host control panel. # This example code is just showing you what the code will look like after you setup # Directory Password Protection using your web host control panel. # NOTES: Adding Directory Password Protection creates an additional password login # to gain access to your wp-admin folder/WordPress Login page. # Users / visitors to your site will not be able to register or login to your site # unless you give them the Directory Password Protection username and password. # You can specify a single specific user or use valid-user to allow all valid # user accounts to be able to login to your site. # EXAMPLE: #AuthType basic #AuthGroupFile /dev/null #AuthUserFile /path/to/protected/server/directory/.htpasswd #AuthName "Password Protected Area" #require user JohnDoe #require valid-user # END EXAMPLE OF OPTIONAL/ADDITIONAL SECURITY MEASURES # END OPTIONAL WP-ADMIN ADDITIONAL SECURITY MEASURES # REQUEST METHODS FILTERED RewriteEngine On RewriteCond %{REQUEST_METHOD} ^(TRACE|DELETE|TRACK|DEBUG) [NC] RewriteRule ^(.*)$ - [F] # BEGIN CUSTOM CODE WPADMIN PLUGIN/FILE SKIP RULES # To add wp-admin plugin skip/bypass rules use BPS wp-admin Custom Code. # If a plugin is calling a wp-admin file in a way that it is being blocked/forbidden # by BPS you can whitelist that file name by creating a skip rule for that file. # # Example: skip/bypass rule for the admin-ajax.php file and post.php file # RewriteCond %{REQUEST_URI} (admin-ajax\.php|post\.php) [NC] # RewriteRule . - [S=2] # # The [S] flag is used to skip following rules. Skip rule [S=2] will skip 2 following RewriteRules. # The skip rules MUST be in descending consecutive number order: 4, 3, 2... # If you add a new skip rule above skip rule 2 it will be skip rule 3: [S=3] # # Example: Multiple skip rules in descending consecutive number order. # Yoast Facebook OpenGraph wp-admin plugin skip/bypass rule # RewriteCond %{QUERY_STRING} page=wpseo_social&key=(.*) [NC] # RewriteRule . - [S=3] # skip/bypass rule for the admin-ajax.php file and post.php file # RewriteCond %{REQUEST_URI} (admin-ajax\.php|post\.php) [NC] # RewriteRule . - [S=2] # # END CUSTOM CODE WPADMIN PLUGIN/FILE SKIP RULES # DEFAULT WHITELIST SKIP RULE FOR WP PRESS THIS RewriteCond %{REQUEST_URI} (press-this\.php) [NC] RewriteRule . - [S=1] # BEGIN BPSQSE-check BPS QUERY STRING EXPLOITS AND FILTERS # WORDPRESS WILL BREAK IF ALL THE BPSQSE FILTERS ARE DELETED # Use BPS wp-admin Custom Code to modify/edit/change this code and to save it permanently. RewriteCond %{HTTP_USER_AGENT} (%0A|%0D|%27|%3C|%3E|%00) [NC,OR] RewriteCond %{HTTP_USER_AGENT} (libwww-perl|wget|python|nikto|curl|scan|java|winhttp|HTTrack|clshttp|archiver|loader|email|harvest|extract|grab|miner) [NC,OR] RewriteCond %{THE_REQUEST} (\?|\*|%2a)+(%20+|\\s+|%20+\\s+|\\s+%20+|\\s+%20+\\s+)HTTP(:/|/) [NC,OR] RewriteCond %{THE_REQUEST} etc/passwd [NC,OR] RewriteCond %{THE_REQUEST} cgi-bin [NC,OR] RewriteCond %{THE_REQUEST} (%0A|%0D) [NC,OR] RewriteCond %{REQUEST_URI} owssvr\.dll [NC,OR] RewriteCond %{HTTP_REFERER} (%0A|%0D|%27|%3C|%3E|%00) [NC,OR] RewriteCond %{HTTP_REFERER} \.opendirviewer\. [NC,OR] RewriteCond %{HTTP_REFERER} users\.skynet\.be.* [NC,OR] RewriteCond %{QUERY_STRING} [a-zA-Z0-9_]=https:// [NC,OR] RewriteCond %{QUERY_STRING} [a-zA-Z0-9_]=(\.\.//?)+ [NC,OR] RewriteCond %{QUERY_STRING} [a-zA-Z0-9_]=/([a-z0-9_.]//?)+ [NC,OR] RewriteCond %{QUERY_STRING} \=PHP[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12} [NC,OR] RewriteCond %{QUERY_STRING} (\.\./|%2e%2e%2f|%2e%2e/|\.\.%2f|%2e\.%2f|%2e\./|\.%2e%2f|\.%2e/) [NC,OR] RewriteCond %{QUERY_STRING} ftp\: [NC,OR] RewriteCond %{QUERY_STRING} http\: [NC,OR] RewriteCond %{QUERY_STRING} https\: [NC,OR] RewriteCond %{QUERY_STRING} \=\|w\| [NC,OR] RewriteCond %{QUERY_STRING} ^(.*)/self/(.*)$ [NC,OR] RewriteCond %{QUERY_STRING} ^(.*)cPath=https://(.*)$ [NC,OR] RewriteCond %{QUERY_STRING} (\<|%3C).*script.*(\>|%3E) [NC,OR] RewriteCond %{QUERY_STRING} (<|%3C)([^s]*s)+cript.*(>|%3E) [NC,OR] RewriteCond %{QUERY_STRING} (\<|%3C).*iframe.*(\>|%3E) [NC,OR] RewriteCond %{QUERY_STRING} (<|%3C)([^i]*i)+frame.*(>|%3E) [NC,OR] RewriteCond %{QUERY_STRING} base64_encode.*\(.*\) [NC,OR] RewriteCond %{QUERY_STRING} base64_(en|de)code[^(]*\([^)]*\) [NC,OR] RewriteCond %{QUERY_STRING} GLOBALS(=|\[|\%[0-9A-Z]{0,2}) [OR] RewriteCond %{QUERY_STRING} _REQUEST(=|\[|\%[0-9A-Z]{0,2}) [OR] RewriteCond %{QUERY_STRING} ^.*(\(|\)|<|>).* [NC,OR] RewriteCond %{QUERY_STRING} (NULL|OUTFILE|LOAD_FILE) [OR] RewriteCond %{QUERY_STRING} (\.{1,}/)+(motd|etc|bin) [NC,OR] RewriteCond %{QUERY_STRING} (localhost|loopback|127\.0\.0\.1) [NC,OR] RewriteCond %{QUERY_STRING} (<|>|'|%0A|%0D|%27|%3C|%3E|%00) [NC,OR] RewriteCond %{QUERY_STRING} concat[^\(]*\( [NC,OR] RewriteCond %{QUERY_STRING} union([^s]*s)+elect [NC,OR] RewriteCond %{QUERY_STRING} union([^a]*a)+ll([^s]*s)+elect [NC,OR] RewriteCond %{QUERY_STRING} (;|<|>|'|"|\)|%0A|%0D|%22|%27|%3C|%3E|%00).*(/\*|union|select|insert|drop|delete|update|cast|create|char|convert|alter|declare|order|script|set|md5|benchmark|encode) [NC,OR] RewriteCond %{QUERY_STRING} (sp_executesql) [NC] RewriteRule ^(.*)$ - [F] # END BPSQSE-check BPS QUERY STRING EXPLOITS AND FILTERS
As far as I know I only added custom code in root folder .htaccess file only.
Not able to paste code here, If you have email let me know so I can send you privately.
Thanks!
I also noticed, I’d renamed my wp-content folder but in both .htaccess file I see path is taking “wp-content” instead renamed folder.
For example, I saw following line
RewriteCond %{REQUEST_URI} ^/wp-content/plugins/adminer/ [NC]
Instead of
RewriteCond %{REQUEST_URI} ^/renamedfolder/plugins/adminer/ [NC]
Is it okay, or I need to change folder name manually?
If you have email let me know so I can send you privately.
*Drinks coffee*
Yes, don’t do that. ?? Your post hit the spam queue and I’ve released the post.
Also I see that the BPS development domain is shown in your root htacccess file instead of your website domain so run the BPS Setup Wizard to setup BPS: https://forum.ait-pro.com/video-tutorials/#setup-overview-free
RewriteCond %{HTTP_REFERER} ^.*demo2.local.*
Hi AITpro,
Thanks for the video guide.
Now all the .htaccess files recreated and taking actual path and taking own domain but still the same issue persists.
Temporary deactivated root and wp-admin .htaccess files > dismiss notice > then re-activated both .htaccess files again.
- The topic ‘Forbidden Error’ is closed to new replies.