• Hi, Pleskians! We are running a UX testing of our upcoming product intended for server management and monitoring.
    We would like to invite you to have a call with us and have some fun checking our prototype. The agenda is pretty simple - we bring new design and some scenarios that you need to walk through and succeed. We will be watching and taking insights for further development of the design.
    If you would like to participate, please use this link to book a meeting. We will sent the link to the clickable prototype at the meeting.
  • Our team is looking to connect with folks who use email services provided by Plesk, or a premium service. If you'd like to be part of the discovery process and share your experiences, we invite you to complete this short screening survey. If your responses match the persona we are looking for, you'll receive a link to schedule a call at your convenience. We look forward to hearing from you!
  • The Horde webmail has been deprecated. Its complete removal is scheduled for April 2025. For details and recommended actions, see the Feature and Deprecation Plan.

Nginx filter false positve

Poggenpower

New Pleskian
Following Security Measures are not restricted to the word press base path like others, which cause false positives if other software like nextcould is installed on the same server:

Block access to sensitive files
Enable bot protection
Block access to potentially sensitive files

E.g.
location ~* "(?:wp-config\.bak|\.wp-config\.php\.swp|(?:readme|license|changelog|-config|-sample)\.(?:php|md|txt|htm|html))"
should look like:
location ~* "^/YOURWPROOT/.*(?:wp-config\.bak|\.wp-config\.php\.swp|(?:readme|license|changelog|-config|-sample)\.(?:php|md|txt|htm|html))"

There are already a lot of rules that have this condition:

Code:
        #extension wp-toolkit begin
        location ~* "^(?:/YOURWPROOT/)wp-content/uploads/.*\.php" { deny all; }
        location ~* "^(?:/YOURWPROOT/)wp-includes/(?!js/tinymce/wp\-tinymce\.php$).*\.php" {
                deny all;
        }
        location ~* "^(?:/YOURWPROOT/)wp-admin/(load-styles|load-scripts)\.php" { deny all; }
        if ($http_referer !~* "^$|^https?://(.*\.)?(schmu\.net|google\.com)(:|/|$)") {
                rewrite "^(?:/YOURWPROOT/)wp-content/uploads/.*\.(gif|png|jpeg|jpg|svg)$" "/YOURWPROOT/fake-hotlink-stub" last;
        }

In Tools like nextclould request to "readme.txt" or "changelog.md" are absolutely valid and won't mean someone is doing evil things.

WordPress Toolkit version: 4.10.2-4121

Bye
Thomas
 
Back
Top