• Resolved Vlada Smitka

    (@smitka)


    Hackers want to download wp-config.php often in case of LFI vulnerability (local file inclusion).

    e.g. slider revolution exploit:
    admin-ajax.php?action=some_action&img=../wp-config.php

    It may be a good idea to block string “wp-config.php” in the $query_string_string.

    I am not aware of any consequences, I block these queries on all my servers.

    https://www.ads-software.com/plugins/block-bad-queries/

Viewing 4 replies - 1 through 4 (of 4 total)
Viewing 4 replies - 1 through 4 (of 4 total)
  • The topic ‘Idea: block "wp-config.php" in QUERY_STRING’ is closed to new replies.