- Timestamp:
- 06/21/2023 11:19:04 PM (3 years ago)
- Location:
- anrghg
- Files:
-
- 16 edited
- 1 copied
-
tags/1.10.1 (copied) (copied from anrghg/trunk)
-
tags/1.10.1/admin/options/settings-cb-access.php (modified) (1 diff)
-
tags/1.10.1/anrghg.php (modified) (7 diffs)
-
tags/1.10.1/package.json (modified) (1 diff)
-
tags/1.10.1/readme.txt (modified) (4 diffs)
-
tags/1.10.1/svn-revs.txt (modified) (1 diff)
-
tags/1.10.1/template-filter-config.php (modified) (4 diffs)
-
tags/1.10.1/template-mini-plugin.php (modified) (6 diffs)
-
tags/1.10.1/template-wp-config.php (modified) (1 diff)
-
trunk/admin/options/settings-cb-access.php (modified) (1 diff)
-
trunk/anrghg.php (modified) (7 diffs)
-
trunk/package.json (modified) (1 diff)
-
trunk/readme.txt (modified) (4 diffs)
-
trunk/svn-revs.txt (modified) (1 diff)
-
trunk/template-filter-config.php (modified) (4 diffs)
-
trunk/template-mini-plugin.php (modified) (6 diffs)
-
trunk/template-wp-config.php (modified) (1 diff)
Legend:
- Unmodified
- Added
- Removed
-
anrghg/tags/1.10.1/admin/options/settings-cb-access.php
r2918017 r2929413 56 56 anrghg_introduction( 57 57 'important', 58 __( 'This security feature is efficient only on websites hosted on a Virtual Private Server (VPS) or a dedicated server.', 'anrghg' ),59 __( ' Shared hosting can be hacked by webshell,from any website in the same root directory.', 'anrghg' )58 __( 'This security feature is efficient only on websites hosted on a dedicated server, a Virtual Private Server (VPS), or shared hosting with VPS level security set up by the hosting provider.', 'anrghg' ), 59 __( 'Unless the hosting provider has set up VPS level security, shared hosting can be hacked by web shell from any website in the same root directory.', 'anrghg' ) 60 60 ); 61 61 anrghg_introduction( -
anrghg/tags/1.10.1/anrghg.php
r2918017 r2929413 14 14 * Tested PHP up to: 8.1 15 15 * CAUTION: The following field is parsed in the `stable tag` folder for upgrade configuration: 16 * Version: 1.10. 016 * Version: 1.10.1 17 17 * Author: ANRGHG 18 18 * Author URI: https://anrghg.sunsite.fr … … 39 39 * 40 40 * Fixes: 41 * @todo Add option to clean up errand meta tags in HTML output, or in editor. Raise issue to WP Core. 41 42 * @todo Code: Switch to object oriented. 42 43 * @todo Documentation: Plugin list: Add mention “AMP compatible”. … … 117 118 * @var string C_S_ANRGHG_VER Plugin version constant. 118 119 */ 119 define( 'C_S_ANRGHG_VER', '1.10. 0' );120 define( 'C_S_ANRGHG_VER', '1.10.1' ); 120 121 121 122 /** … … 191 192 * its development without making sure that the job will be done effectively. The 192 193 * unaddressed Footnotes user requests are followed up in this new plugin started 193 * after it had become clear to me that there was no other way left.194 * after it had become clear to me that there remained no other way forward. 194 195 * @pewgeuges provided support to Footnotes users from 2020-10-26 to 2022-03-29, 195 196 * until the Footnotes plugin was abandoned on 2022-04-14. … … 221 222 * Style sheets. 222 223 * 223 * @see * Outputs internal CSS.224 * @see anrghg_protected_echo().225 224 * External style sheets appear to have too many and too serious downsides: 226 225 * … … 235 234 * internal. 236 235 * 236 * @see * Outputs internal CSS. 237 * @see anrghg_protected_echo(). 238 * 239 * 240 * Separators in class names: 241 * 237 242 * Class names derived from settings keys still contain underscores but as far as 238 243 * possible, CSS classes use hyphen only. Identifiers used in URLs, likewise. But … … 248 253 * are even harder to keep in sync. Loading partials has certainly downsides from 249 254 * a performance perspective. 255 * 250 256 * Instead, filters may be added to a set of output hooks. 251 257 */ -
anrghg/tags/1.10.1/package.json
r2918017 r2929413 1 1 { 2 2 "name": "anrghg", 3 "version": " 1.10. 0",3 "version": " 1.10.1", 4 4 "description": "A.N.R.GHG Publishing Toolkit", 5 5 "main": "index.js", -
anrghg/tags/1.10.1/readme.txt
r2918017 r2929413 8 8 Requires PHP: 5.6 9 9 Tested PHP up to: 8.1 10 Package Version: 1.10. 0.011 Version: 1.10. 010 Package Version: 1.10.1.0 11 Version: 1.10.1 12 12 CAUTION: The following field is parsed in `trunk/` for release configuration: 13 Stable Tag: 1.10. 013 Stable Tag: 1.10.1 14 14 License: GPLv2 or later 15 15 License URI: https://www.gnu.org/licenses/gpl-2.0.html … … 46 46 * Display the login activation status by icon in the Admin bar; 47 47 * Blank the login dialog out if it is convenient to access the WordPress Admin area through the hosting platform exclusively. 48 * CAUTION: Shared hosting is prone to being hacked by webshell even if only a single one of the hundreds of websites sharing the same server’s root directory is compromised. Therefore, the A.N.R.GHG Publishing Toolkit’s security feature is efficient only on websites hosted on a Virtual Private Server (VPS) or a dedicated server.48 * CAUTION: Unless the hosting provider has set up VPS level security, shared hosting is prone to being hacked by web shell even if only a single one of the websites sharing the same server’s root directory is compromised. Therefore, the A.N.R.GHG Publishing Toolkit’s security feature is efficient only on websites hosted on a dedicated server, a Virtual Private Server (VPS), or shared hosting with VPS level security set up by the hosting provider. 49 49 50 50 … … 174 174 = Security = 175 175 176 Shared hosting is prone to being hacked by webshell even if only a single one of the hundreds of websites sharing the same server’s root directory is compromised. Therefore, the A.N.R.GHG Publishing Toolkit’s security feature is efficient only on websites hosted on a Virtual Private Server (VPS) or a dedicated server.176 Unless the hosting provider has set up VPS level security, shared hosting is prone to being hacked by web shell even if only a single one of the websites sharing the same server’s root directory is compromised. Therefore, the A.N.R.GHG Publishing Toolkit’s security feature is efficient only on websites hosted on a dedicated server, a Virtual Private Server (VPS), or shared hosting with VPS level security set up by the hosting provider. 177 177 178 178 For an additional layer of security, it is recommended to deny access to the `wp-config.php` file, and to the `debug.log` file in case there is any. To achieve this, please add the code snippet provided for the purpose near the bottom of the `template-wp-config.php` file by copy-pasting it from this file in the `anrghg/` plugin folder to the `.htaccess` file in the WordPress root directory. … … 586 586 = 1.10.0 (2023-05-27) = 587 587 588 * Settings: Security: Add warning in the Security section introduction.589 * Documentation: Security: Add warning in the Security notice of the Installation section.590 * Documentation: Security: Add warning in the Security feature description.591 * Documentation: Security: Add warning in the “How about using jQuery?” FAQ item.592 * Documentation: Change plugin name from “A.N.R.GHG Publishing Helper“to “A.N.R.GHG Publishing Toolkit”.593 * Documentation: Rename t emplate files from `tpl-*.php` to `template-*.php`.588 * Settings: Security: Add a warning in the Security section introduction. 589 * Documentation: Security: Add a warning in the Security notice of the Installation section. 590 * Documentation: Security: Add a warning in the Security feature description. 591 * Documentation: Security: Add a warning in the “How about using jQuery?” FAQ item. 592 * Documentation: Change the plugin name from “A.N.R.GHG Publishing Helper” to “A.N.R.GHG Publishing Toolkit”. 593 * Documentation: Rename the template files from `tpl-*.php` to `template-*.php`. 594 594 * Documentation: Remove the sample `anrghg-thanks-block.json` file for now. 595 595 -
anrghg/tags/1.10.1/svn-revs.txt
r2918017 r2929413 11 11 Past revisions: 12 12 13 1.10.0.0 2918017 2023-05-27 09:02:28 +0000 (Sat, 27 May 2023) 13 14 1.9.4.0 2914557 2023-05-19 02:11:49 +0000 (Fri, 19 May 2023) 14 15 1.9.3.0 2913991 2023-05-17 22:06:16 +0000 (Wed, 17 May 2023) -
anrghg/tags/1.10.1/template-filter-config.php
r2918017 r2929413 65 65 * 66 66 * CAUTION: This security feature is efficient only on websites hosted on 67 * a Virtual Private Server (VPS) or a dedicated server. 68 * 69 * Shared hosting can be hacked by webshell, from any website in 70 * the same root directory. 67 * a dedicated server, a Virtual Private Server (VPS), or shared 68 * hosting with VPS level security set up by the hosting provider. 69 * 70 * Unless the hosting provider has set up VPS level security, 71 * shared hosting can be hacked by web shell from any website 72 * in the same root directory. 73 * 74 * @link https://resources.infosecinstitute.com/topic/hacking-a-wordpress-site/ 75 * @date updated_date="05/05/2015" posted_date="05/05/2015" 76 * @link https://secure.wphackedhelp.com/blog/hack-wordpress-website/ 77 * @date updated_time="2023-01-06T07:34:56+00:00" published_time="2021-02-25T14:16:20+00:00" 78 * @link https://www.cloudways.com/blog/wordpress-sql-injection-protection/ 79 * @date Updated on December 8, 2021 80 * @link https://www.getastra.com/blog/knowledge-base/shared-hosting-security-risks/ 81 * @date Updated on: July 22, 2022 82 * @link https://secure.wphackedhelp.com/blog/web-shell-php-exploit/ 83 * @date Updated on January 4, 2023 84 * 85 * Unlike hosting platform login information, WordPress login information 86 * may be transparent to SQL injection attacks. 87 * 88 * Logging into WordPress may be done through the Hosting Platform. 89 * If this is the only way used to access the Admin area, then the login 90 * dialog may be blanked out. An optional message may then be displayed 91 * in its place. 71 92 * 72 93 * This security enhancement optionally prevents a WordPress website from … … 77 98 * bots to monitor that availability in real time. 78 99 * 79 * Unlike hosting platform login information, WordPress login information80 * may be transparent to SQL injection attacks.81 *82 * Logging into WordPress may be done through the Hosting Platform.83 * If this is the only way used to access the Admin area, then the login84 * dialog may be blanked out. An optional message may then be displayed85 * in its place.86 *87 100 * If logging in on a public page is desired, the authentication cookie 88 101 * generation may be active during narrow windows of opportunity. … … 104 117 * FTP client for editing the file locally. 105 118 * 106 * @link https://resources.infosecinstitute.com/topic/hacking-a-wordpress-site/107 * @link https://secure.wphackedhelp.com/blog/hack-wordpress-website/108 * @link https://www.cloudways.com/blog/wordpress-sql-injection-protection/109 *110 119 * The name of the constant is `ANRGHG_WP_LOGIN_ACTIVE` (by default) or 111 120 * `ANRGHG_WP_LOGIN_` plus some letters and underscore as configured so … … 113 122 * @see template in `template-mini-plugin.php`. 114 123 * 115 * // Turn login off by replacing true with false:116 * define( 'ANRGHG_WP_LOGIN_ACTIVE', true );117 *118 124 * If the login dialog is not used any longer, alternative high-profile 119 125 * or standard behavior blanks the dialog out and displays a message in 120 * its place (high profile) or does not elaborate (standard).126 * its place, for high profile, or does not elaborate, for standard. 121 127 * 122 128 * This option is based on code from Jonathan Daggerhart (@daggerhart on GitHub). -
anrghg/tags/1.10.1/template-mini-plugin.php
r2918017 r2929413 6 6 * @package WordPress 7 7 * 8 * Description: Myconfiguration filters and output filters.8 * Description: Access toggle, configuration filters and output filters. 9 9 * 10 10 * Installation: … … 17 17 * 18 18 * Once this mini plugin is activated, the filters copy-pasted from the filter template 19 * files, become effective and override the settings. 19 * files or already present below become effective and override the settings configured 20 * on the A.N.R.GHG Publishing Toolkit’s Settings page. Also the access toggle constanẗ 21 * starts determining whether authentication cookies are sent, or whether logging in is 22 * available at all, depending on the settings. 20 23 * 21 24 * @see anrghg/template-filter-config.php … … 40 43 * 41 44 * CAUTION: This security feature is efficient only on websites hosted on 42 * a Virtual Private Server (VPS) or a dedicated server. 45 * a dedicated server, a Virtual Private Server (VPS), or shared 46 * hosting with VPS level security set up by the hosting provider. 43 47 * 44 * Shared hosting can be hacked by webshell, from any website in 45 * the same root directory. 48 * Unless the hosting provider has set up VPS level security, 49 * shared hosting can be hacked by web shell from any website 50 * in the same root directory. 46 51 * 47 * This security enhancement optionally prevents a WordPress website from 48 * sending auth cookies, either by blocking auth cookie generation, or by 49 * making the login dialog unavailable in the first place, an option that 50 * must not be chosen if the login dialog is still used sporadically. 51 * Making a public page reflect the availability of an action would allow 52 * bots to monitor that availability in real time. 52 * @link https://resources.infosecinstitute.com/topic/hacking-a-wordpress-site/ 53 * @date updated_date="05/05/2015" posted_date="05/05/2015" 54 * @link https://secure.wphackedhelp.com/blog/hack-wordpress-website/ 55 * @date updated_time="2023-01-06T07:34:56+00:00" published_time="2021-02-25T14:16:20+00:00" 56 * @link https://www.cloudways.com/blog/wordpress-sql-injection-protection/ 57 * @date Updated on December 8, 2021 58 * @link https://www.getastra.com/blog/knowledge-base/shared-hosting-security-risks/ 59 * @date Updated on: July 22, 2022 60 * @link https://secure.wphackedhelp.com/blog/web-shell-php-exploit/ 61 * @date Updated on January 4, 2023 53 62 * 54 63 * Unlike hosting platform login information, WordPress login information … … 59 68 * dialog may be blanked out. An optional message may then be displayed 60 69 * in its place. 70 * 71 * This security enhancement optionally prevents a WordPress website from 72 * sending auth cookies, either by blocking auth cookie generation, or by 73 * making the login dialog unavailable in the first place, an option that 74 * must not be chosen if the login dialog is still used sporadically. 75 * Making a public page reflect the availability of an action would allow 76 * bots to monitor that availability in real time. 61 77 * 62 78 * If logging in on a public page is desired, the authentication cookie … … 79 95 * FTP client for editing the file locally. 80 96 * 81 * @link https://resources.infosecinstitute.com/topic/hacking-a-wordpress-site/82 * @link https://secure.wphackedhelp.com/blog/hack-wordpress-website/83 * @link https://www.cloudways.com/blog/wordpress-sql-injection-protection/84 *85 97 * The name of the constant is `ANRGHG_WP_LOGIN_ACTIVE` (by default) or 86 98 * `ANRGHG_WP_LOGIN_` plus some letters and underscore as configured so … … 88 100 * @see template in `template-mini-plugin.php`. 89 101 * 90 * // Turn login off by replacing true with false:91 * define( 'ANRGHG_WP_LOGIN_ACTIVE', true );92 *93 102 * If the login dialog is not used any longer, alternative high-profile 94 103 * or standard behavior blanks the dialog out and displays a message in 95 * its place (high profile) or does not elaborate (standard).104 * its place, for high profile, or does not elaborate, for standard. 96 105 * 97 106 * This option is based on code from Jonathan Daggerhart (@daggerhart on GitHub). -
anrghg/tags/1.10.1/template-wp-config.php
r2918017 r2929413 69 69 // In the process, the wp-config.php file should be protected as well 70 70 // by adding "wp-config.php" in the start tag of the Files directive, 71 // with extended regular expressions supported: 71 // with extended regular expressions supported due to the "~" in the 72 // opening tag of the "Files" directive: 72 73 /* 73 74 -
anrghg/trunk/admin/options/settings-cb-access.php
r2918017 r2929413 56 56 anrghg_introduction( 57 57 'important', 58 __( 'This security feature is efficient only on websites hosted on a Virtual Private Server (VPS) or a dedicated server.', 'anrghg' ),59 __( ' Shared hosting can be hacked by webshell,from any website in the same root directory.', 'anrghg' )58 __( 'This security feature is efficient only on websites hosted on a dedicated server, a Virtual Private Server (VPS), or shared hosting with VPS level security set up by the hosting provider.', 'anrghg' ), 59 __( 'Unless the hosting provider has set up VPS level security, shared hosting can be hacked by web shell from any website in the same root directory.', 'anrghg' ) 60 60 ); 61 61 anrghg_introduction( -
anrghg/trunk/anrghg.php
r2918017 r2929413 14 14 * Tested PHP up to: 8.1 15 15 * CAUTION: The following field is parsed in the `stable tag` folder for upgrade configuration: 16 * Version: 1.10. 016 * Version: 1.10.1 17 17 * Author: ANRGHG 18 18 * Author URI: https://anrghg.sunsite.fr … … 39 39 * 40 40 * Fixes: 41 * @todo Add option to clean up errand meta tags in HTML output, or in editor. Raise issue to WP Core. 41 42 * @todo Code: Switch to object oriented. 42 43 * @todo Documentation: Plugin list: Add mention “AMP compatible”. … … 117 118 * @var string C_S_ANRGHG_VER Plugin version constant. 118 119 */ 119 define( 'C_S_ANRGHG_VER', '1.10. 0' );120 define( 'C_S_ANRGHG_VER', '1.10.1' ); 120 121 121 122 /** … … 191 192 * its development without making sure that the job will be done effectively. The 192 193 * unaddressed Footnotes user requests are followed up in this new plugin started 193 * after it had become clear to me that there was no other way left.194 * after it had become clear to me that there remained no other way forward. 194 195 * @pewgeuges provided support to Footnotes users from 2020-10-26 to 2022-03-29, 195 196 * until the Footnotes plugin was abandoned on 2022-04-14. … … 221 222 * Style sheets. 222 223 * 223 * @see * Outputs internal CSS.224 * @see anrghg_protected_echo().225 224 * External style sheets appear to have too many and too serious downsides: 226 225 * … … 235 234 * internal. 236 235 * 236 * @see * Outputs internal CSS. 237 * @see anrghg_protected_echo(). 238 * 239 * 240 * Separators in class names: 241 * 237 242 * Class names derived from settings keys still contain underscores but as far as 238 243 * possible, CSS classes use hyphen only. Identifiers used in URLs, likewise. But … … 248 253 * are even harder to keep in sync. Loading partials has certainly downsides from 249 254 * a performance perspective. 255 * 250 256 * Instead, filters may be added to a set of output hooks. 251 257 */ -
anrghg/trunk/package.json
r2918017 r2929413 1 1 { 2 2 "name": "anrghg", 3 "version": " 1.10. 0",3 "version": " 1.10.1", 4 4 "description": "A.N.R.GHG Publishing Toolkit", 5 5 "main": "index.js", -
anrghg/trunk/readme.txt
r2918017 r2929413 8 8 Requires PHP: 5.6 9 9 Tested PHP up to: 8.1 10 Package Version: 1.10. 0.011 Version: 1.10. 010 Package Version: 1.10.1.0 11 Version: 1.10.1 12 12 CAUTION: The following field is parsed in `trunk/` for release configuration: 13 Stable Tag: 1.10. 013 Stable Tag: 1.10.1 14 14 License: GPLv2 or later 15 15 License URI: https://www.gnu.org/licenses/gpl-2.0.html … … 46 46 * Display the login activation status by icon in the Admin bar; 47 47 * Blank the login dialog out if it is convenient to access the WordPress Admin area through the hosting platform exclusively. 48 * CAUTION: Shared hosting is prone to being hacked by webshell even if only a single one of the hundreds of websites sharing the same server’s root directory is compromised. Therefore, the A.N.R.GHG Publishing Toolkit’s security feature is efficient only on websites hosted on a Virtual Private Server (VPS) or a dedicated server.48 * CAUTION: Unless the hosting provider has set up VPS level security, shared hosting is prone to being hacked by web shell even if only a single one of the websites sharing the same server’s root directory is compromised. Therefore, the A.N.R.GHG Publishing Toolkit’s security feature is efficient only on websites hosted on a dedicated server, a Virtual Private Server (VPS), or shared hosting with VPS level security set up by the hosting provider. 49 49 50 50 … … 174 174 = Security = 175 175 176 Shared hosting is prone to being hacked by webshell even if only a single one of the hundreds of websites sharing the same server’s root directory is compromised. Therefore, the A.N.R.GHG Publishing Toolkit’s security feature is efficient only on websites hosted on a Virtual Private Server (VPS) or a dedicated server.176 Unless the hosting provider has set up VPS level security, shared hosting is prone to being hacked by web shell even if only a single one of the websites sharing the same server’s root directory is compromised. Therefore, the A.N.R.GHG Publishing Toolkit’s security feature is efficient only on websites hosted on a dedicated server, a Virtual Private Server (VPS), or shared hosting with VPS level security set up by the hosting provider. 177 177 178 178 For an additional layer of security, it is recommended to deny access to the `wp-config.php` file, and to the `debug.log` file in case there is any. To achieve this, please add the code snippet provided for the purpose near the bottom of the `template-wp-config.php` file by copy-pasting it from this file in the `anrghg/` plugin folder to the `.htaccess` file in the WordPress root directory. … … 586 586 = 1.10.0 (2023-05-27) = 587 587 588 * Settings: Security: Add warning in the Security section introduction.589 * Documentation: Security: Add warning in the Security notice of the Installation section.590 * Documentation: Security: Add warning in the Security feature description.591 * Documentation: Security: Add warning in the “How about using jQuery?” FAQ item.592 * Documentation: Change plugin name from “A.N.R.GHG Publishing Helper“to “A.N.R.GHG Publishing Toolkit”.593 * Documentation: Rename t emplate files from `tpl-*.php` to `template-*.php`.588 * Settings: Security: Add a warning in the Security section introduction. 589 * Documentation: Security: Add a warning in the Security notice of the Installation section. 590 * Documentation: Security: Add a warning in the Security feature description. 591 * Documentation: Security: Add a warning in the “How about using jQuery?” FAQ item. 592 * Documentation: Change the plugin name from “A.N.R.GHG Publishing Helper” to “A.N.R.GHG Publishing Toolkit”. 593 * Documentation: Rename the template files from `tpl-*.php` to `template-*.php`. 594 594 * Documentation: Remove the sample `anrghg-thanks-block.json` file for now. 595 595 -
anrghg/trunk/svn-revs.txt
r2918017 r2929413 11 11 Past revisions: 12 12 13 1.10.0.0 2918017 2023-05-27 09:02:28 +0000 (Sat, 27 May 2023) 13 14 1.9.4.0 2914557 2023-05-19 02:11:49 +0000 (Fri, 19 May 2023) 14 15 1.9.3.0 2913991 2023-05-17 22:06:16 +0000 (Wed, 17 May 2023) -
anrghg/trunk/template-filter-config.php
r2918017 r2929413 65 65 * 66 66 * CAUTION: This security feature is efficient only on websites hosted on 67 * a Virtual Private Server (VPS) or a dedicated server. 68 * 69 * Shared hosting can be hacked by webshell, from any website in 70 * the same root directory. 67 * a dedicated server, a Virtual Private Server (VPS), or shared 68 * hosting with VPS level security set up by the hosting provider. 69 * 70 * Unless the hosting provider has set up VPS level security, 71 * shared hosting can be hacked by web shell from any website 72 * in the same root directory. 73 * 74 * @link https://resources.infosecinstitute.com/topic/hacking-a-wordpress-site/ 75 * @date updated_date="05/05/2015" posted_date="05/05/2015" 76 * @link https://secure.wphackedhelp.com/blog/hack-wordpress-website/ 77 * @date updated_time="2023-01-06T07:34:56+00:00" published_time="2021-02-25T14:16:20+00:00" 78 * @link https://www.cloudways.com/blog/wordpress-sql-injection-protection/ 79 * @date Updated on December 8, 2021 80 * @link https://www.getastra.com/blog/knowledge-base/shared-hosting-security-risks/ 81 * @date Updated on: July 22, 2022 82 * @link https://secure.wphackedhelp.com/blog/web-shell-php-exploit/ 83 * @date Updated on January 4, 2023 84 * 85 * Unlike hosting platform login information, WordPress login information 86 * may be transparent to SQL injection attacks. 87 * 88 * Logging into WordPress may be done through the Hosting Platform. 89 * If this is the only way used to access the Admin area, then the login 90 * dialog may be blanked out. An optional message may then be displayed 91 * in its place. 71 92 * 72 93 * This security enhancement optionally prevents a WordPress website from … … 77 98 * bots to monitor that availability in real time. 78 99 * 79 * Unlike hosting platform login information, WordPress login information80 * may be transparent to SQL injection attacks.81 *82 * Logging into WordPress may be done through the Hosting Platform.83 * If this is the only way used to access the Admin area, then the login84 * dialog may be blanked out. An optional message may then be displayed85 * in its place.86 *87 100 * If logging in on a public page is desired, the authentication cookie 88 101 * generation may be active during narrow windows of opportunity. … … 104 117 * FTP client for editing the file locally. 105 118 * 106 * @link https://resources.infosecinstitute.com/topic/hacking-a-wordpress-site/107 * @link https://secure.wphackedhelp.com/blog/hack-wordpress-website/108 * @link https://www.cloudways.com/blog/wordpress-sql-injection-protection/109 *110 119 * The name of the constant is `ANRGHG_WP_LOGIN_ACTIVE` (by default) or 111 120 * `ANRGHG_WP_LOGIN_` plus some letters and underscore as configured so … … 113 122 * @see template in `template-mini-plugin.php`. 114 123 * 115 * // Turn login off by replacing true with false:116 * define( 'ANRGHG_WP_LOGIN_ACTIVE', true );117 *118 124 * If the login dialog is not used any longer, alternative high-profile 119 125 * or standard behavior blanks the dialog out and displays a message in 120 * its place (high profile) or does not elaborate (standard).126 * its place, for high profile, or does not elaborate, for standard. 121 127 * 122 128 * This option is based on code from Jonathan Daggerhart (@daggerhart on GitHub). -
anrghg/trunk/template-mini-plugin.php
r2918017 r2929413 6 6 * @package WordPress 7 7 * 8 * Description: Myconfiguration filters and output filters.8 * Description: Access toggle, configuration filters and output filters. 9 9 * 10 10 * Installation: … … 17 17 * 18 18 * Once this mini plugin is activated, the filters copy-pasted from the filter template 19 * files, become effective and override the settings. 19 * files or already present below become effective and override the settings configured 20 * on the A.N.R.GHG Publishing Toolkit’s Settings page. Also the access toggle constanẗ 21 * starts determining whether authentication cookies are sent, or whether logging in is 22 * available at all, depending on the settings. 20 23 * 21 24 * @see anrghg/template-filter-config.php … … 40 43 * 41 44 * CAUTION: This security feature is efficient only on websites hosted on 42 * a Virtual Private Server (VPS) or a dedicated server. 45 * a dedicated server, a Virtual Private Server (VPS), or shared 46 * hosting with VPS level security set up by the hosting provider. 43 47 * 44 * Shared hosting can be hacked by webshell, from any website in 45 * the same root directory. 48 * Unless the hosting provider has set up VPS level security, 49 * shared hosting can be hacked by web shell from any website 50 * in the same root directory. 46 51 * 47 * This security enhancement optionally prevents a WordPress website from 48 * sending auth cookies, either by blocking auth cookie generation, or by 49 * making the login dialog unavailable in the first place, an option that 50 * must not be chosen if the login dialog is still used sporadically. 51 * Making a public page reflect the availability of an action would allow 52 * bots to monitor that availability in real time. 52 * @link https://resources.infosecinstitute.com/topic/hacking-a-wordpress-site/ 53 * @date updated_date="05/05/2015" posted_date="05/05/2015" 54 * @link https://secure.wphackedhelp.com/blog/hack-wordpress-website/ 55 * @date updated_time="2023-01-06T07:34:56+00:00" published_time="2021-02-25T14:16:20+00:00" 56 * @link https://www.cloudways.com/blog/wordpress-sql-injection-protection/ 57 * @date Updated on December 8, 2021 58 * @link https://www.getastra.com/blog/knowledge-base/shared-hosting-security-risks/ 59 * @date Updated on: July 22, 2022 60 * @link https://secure.wphackedhelp.com/blog/web-shell-php-exploit/ 61 * @date Updated on January 4, 2023 53 62 * 54 63 * Unlike hosting platform login information, WordPress login information … … 59 68 * dialog may be blanked out. An optional message may then be displayed 60 69 * in its place. 70 * 71 * This security enhancement optionally prevents a WordPress website from 72 * sending auth cookies, either by blocking auth cookie generation, or by 73 * making the login dialog unavailable in the first place, an option that 74 * must not be chosen if the login dialog is still used sporadically. 75 * Making a public page reflect the availability of an action would allow 76 * bots to monitor that availability in real time. 61 77 * 62 78 * If logging in on a public page is desired, the authentication cookie … … 79 95 * FTP client for editing the file locally. 80 96 * 81 * @link https://resources.infosecinstitute.com/topic/hacking-a-wordpress-site/82 * @link https://secure.wphackedhelp.com/blog/hack-wordpress-website/83 * @link https://www.cloudways.com/blog/wordpress-sql-injection-protection/84 *85 97 * The name of the constant is `ANRGHG_WP_LOGIN_ACTIVE` (by default) or 86 98 * `ANRGHG_WP_LOGIN_` plus some letters and underscore as configured so … … 88 100 * @see template in `template-mini-plugin.php`. 89 101 * 90 * // Turn login off by replacing true with false:91 * define( 'ANRGHG_WP_LOGIN_ACTIVE', true );92 *93 102 * If the login dialog is not used any longer, alternative high-profile 94 103 * or standard behavior blanks the dialog out and displays a message in 95 * its place (high profile) or does not elaborate (standard).104 * its place, for high profile, or does not elaborate, for standard. 96 105 * 97 106 * This option is based on code from Jonathan Daggerhart (@daggerhart on GitHub). -
anrghg/trunk/template-wp-config.php
r2918017 r2929413 69 69 // In the process, the wp-config.php file should be protected as well 70 70 // by adding "wp-config.php" in the start tag of the Files directive, 71 // with extended regular expressions supported: 71 // with extended regular expressions supported due to the "~" in the 72 // opening tag of the "Files" directive: 72 73 /* 73 74
Note: See TracChangeset
for help on using the changeset viewer.