T.ME/BIBIL_0DAY
CasperSecurity


Server : Apache/2
System : Linux server-15-235-50-60 5.15.0-164-generic #174-Ubuntu SMP Fri Nov 14 20:25:16 UTC 2025 x86_64
User : gositeme ( 1004)
PHP Version : 8.2.29
Disable Function : exec,system,passthru,shell_exec,proc_close,proc_open,dl,popen,show_source,posix_kill,posix_mkfifo,posix_getpwuid,posix_setpgid,posix_setsid,posix_setuid,posix_setgid,posix_seteuid,posix_setegid,posix_uname
Directory :  /home/gositeme/domains/soundstudiopro.com/private_html/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Current File : /home/gositeme/domains/soundstudiopro.com/private_html/HTACCESS_CLEANUP_COMPLETE.md
# ✅ .HTACCESS SITE-WIDE CLEANUP COMPLETE

**Date:** December 12, 2025  
**Status:** 72 FILES CLEANED - ALL MALICIOUS RULES REMOVED

---

## 🚨 CRITICAL FINDING

**The attacker modified 72 .htaccess files site-wide** to allow access to backdoor files!

### Malicious Pattern Found:
```apache
<FilesMatch ".(py|exe|php)$">
 Order allow,deny
 Deny from all
</FilesMatch>
<FilesMatch "^(about.php|radio.php|index.php|content.php|lock360.php|admin.php|wp-login.php)$">
 Order allow,deny
 Allow from all  ← MALICIOUS! Allows backdoor access
</FilesMatch>
```

**What This Did:**
1. Blocked all PHP files (legitimate security)
2. **BUT THEN ALLOWED** backdoor files (`about.php`, `radio.php`, etc.)
3. This ensured backdoors would work even in protected directories

---

## ✅ CLEANUP RESULTS

### Files Cleaned: **72 .htaccess files**

**Directories Cleaned:**
- `assets/` and all subdirectories (20+ files)
- `api/`
- `admin/`
- `admin_includes/`
- `radio/` and all subdirectories (10+ files)
- `uploads/` and all subdirectories (7 files)
- `audio_files/` and subdirectories
- `config/`, `components/`, `cron/`, `database/`, `includes/`
- `gocodeme.com/` and all subdirectories
- `home/` and subdirectories
- `js/`, `lang/`, `logs/`, `migrations/`, `studio/`, `webhooks/`
- And many more...

### Files Skipped (Already Clean):
- `auth/.htaccess` - Already cleaned
- `utils/.htaccess` - Already cleaned  
- `445367/.htaccess` - Already cleaned (now fixed for compatibility)

---

## 🔧 WHAT WAS REMOVED

### Malicious Rule Removed:
```apache
<FilesMatch "^(about.php|radio.php|index.php|content.php|lock360.php|admin.php|wp-login.php)$">
 Order allow,deny
 Allow from all
</FilesMatch>
```

**This rule allowed:**
- `about.php` - File manager backdoor
- `radio.php` - Obfuscated backdoor
- `wp-login.php` - WordPress backdoor
- `lock360.php` - Unknown backdoor
- `content.php` - Unknown backdoor

### What Remains (Legitimate Security):
```apache
<FilesMatch ".(py|exe|php)$">
 Order allow,deny
 Deny from all
</FilesMatch>
```

**This is GOOD** - it blocks PHP execution in asset directories (legitimate security).

---

## 🎯 RESULT

**All .htaccess files are now clean:**
- ✅ Malicious allow rules removed
- ✅ Legitimate security rules preserved
- ✅ Backdoors can no longer be accessed via these rules
- ✅ Site functionality maintained

---

## 🔍 VERIFICATION

**Check for remaining malicious rules:**
```bash
# Should return 0 (no matches)
find . -name ".htaccess" -exec grep -l "about\.php.*Allow\|radio\.php.*Allow" {} \;
```

**Result:** ✅ **0 files found** - All clean!

---

## 📋 FILES CLEANED (Sample)

1. `assets/.htaccess` ✅
2. `api/.htaccess` ✅
3. `admin/.htaccess` ✅
4. `radio/.htaccess` ✅
5. `uploads/.htaccess` ✅
6. ... and 67 more files

---

## ⚠️ ADDITIONAL FIX

**Fixed `445367/.htaccess` for compatibility:**
- Removed `RequireAll` (Apache 2.4+ only)
- Using `FilesMatch` and rewrite rules (compatible with all versions)

---

## 🛡️ SECURITY STATUS

**Before:**
- 72 .htaccess files with malicious allow rules
- Backdoors accessible even in protected directories
- Attacker could place backdoors anywhere

**After:**
- ✅ All malicious rules removed
- ✅ Backdoors blocked in all directories
- ✅ Legitimate security rules preserved
- ✅ Site functionality maintained

---

**Status:** ✅ **CLEANUP COMPLETE - ALL .HTACCESS FILES SECURED**

The attacker's malicious .htaccess modifications have been completely removed. Your site is now much more secure!


CasperSecurity Mini