<h2>Description</h2> <h3>Short description</h3> <p>The tool against directory traversal (observing) security vulnerability. It recursively adds a index.php file in all given directories.</p> <h3>How to use</h3> <p><strong>Run from a console:</strong></p> <p><em>php index.php (--add or --remove) (The directory path for recursively adding or removing the index.php) [The template path for adding the index.php file]</em></p> <p><strong>Example #1</strong>: adding new index.php files without overwrite existing one.</p> <p><em>php index.php --add ../../.. ./templates/redirect-to-previous-directory.php</em></p> <p><strong>Example #2:</strong> cleaning a directory of old index.php files.</p> <p><em>php index.php --remove ../../..</em></p> <p><strong>Available templates for index.php</strong></p> <p>These are templates for popular methods to prevent directory traversal:</p> <ul> <li>The template error-404.php is used to show error 404 - a page not found.</li> <li>The template redirect-to-previous-directory.php is used to do the redirect to a previous directory.</li> </ul> <p></p> <h3>Installation</h3> <p><strong>Just download the archive and use the tool by described instruction.</strong></p> <p>You can also use this tool in your project by adding the dependency directly to your <em>composer.json</em> file:</p>
"repositories": [
{ "type": "vcs", "url": "https://github.com/zapalm/auto-indexer" } ], "require": { "php": ">=5.3", "zapalm/auto-indexer": "dev-master"
}
<h2>Data sheet</h2> <ul> <li>Version: <span>1.0.1 (2019-09-23)</span></li> <li>License: <span>Open source license</span></li> <li>Product type: <span>Script</span></li> </ul>
Komentarze (0)
Chwilowo nie możesz polubić tej opinii
Zgłoś komentarz
Zgłoszenie wysłane
Twoje zgłoszenie nie może zostać wysłane