\u4e00\u822c\u800c\u8a00\uff0c\u53ea\u8981\u7cfb\u7d71\u914d\u7f6e\u5b8c\u6210(web server + php + mysql)\uff0c\u5728\u5230 phpmyadmin\u5b98\u7db2<\/a>\u4e0b\u8f09 phpmyadmin\u5957\u4ef6\u5f8c\uff0c\u900f\u904eftp\u4e0a\u50b3\u5230\u7a7a\u9593\uff0c\u76f4\u63a5\u6253\u958b\u700f\u89bd\u5668\u53ca\u8def\u9015\uff0c\u5c31\u53ef\u4ee5\u76f4\u63a5\u57f7\u884cphpmyadmin\u3002<\/p>\n <\/p>\n \u6211\u5011\u9019\u6b21\u9047\u5230\u4e00\u4f4d\u4f7f\u7528whm\/cpanel\u7684\u7368\u7acb\u4e3b\u6a5f\u7528\u6236\uff0c\u5728\u4ed6\u7684\u4e3b\u6a5f\u7a7a\u9593\u4e0a\uff0c\u7121\u8ad6\u5c6c\u6027\u6216\u662f\u6b0a\u9650\u5982\u4f55\u7684\u4fee\u6539\uff0c\u6253\u958bphpmyadmin\u90fd\u662f\u4e00\u7247\u7a7a\u767d\uff0c\u8acb\u5c0b\u6c42\u6211\u5011\u7684\u5354\u52a9\u3002<\/p>\n \u7576\u9047\u5230\u975e\u901a\u4fd7\u7684\u554f\u984c\u6642\uff0c\u6709\u6642\u53ef\u4ee5\u900f\u904egoogle.com\u53bb\u641c\u7d22\u95dc\u9375\u5b57\u5f8c\u89e3\u6c7a\uff0c\u4f46\u4e5f\u53ef\u80fd\u662f\u7121\u89e3\u7684\uff0c\u9019\u6642\u6211\u5011\u4e7e\u8106\u9032\u53bb\u67e5\u770b error_log \u6a94\uff0c\u7d50\u679c\u767c\u73fe\u4e0b\u5217\u932f\u8aa4\u8a0a\u606f\uff1a<\/p>\n
\nModSecurity: Access denied with code 406 (phase 2). Pattern match “(?:\\\\\\\\b(?:(?:type\\\\\\\\b\\\\\\\\W*?\\\\\\\\b(?:text\\\\\\\\b\\\\\\\\W*?\\\\\\\\b(?:j(?:ava)?|ecma|vb)|application\\\\\\\\b\\\\\\\\W*?\\\\\\\\bx-(?:java|vb))script|c(?:opyparentfolder|reatetextrange)|get(?:special|parent)folder|iframe\\\\\\\\b.{0,100}?\\\\\\\\bsrc)\\\\\\\\b|on(?:(?:mo(?:use(?:o(?:ver|ut)|down|move|up)|ve)| …” at ARGS:scripts[]. [file “\/usr\/local\/apache\/conf\/modsec2.user.conf”] [line “114”] [id “950004”] [msg “Cross-site Scripting (XSS) Attack”] [data “.cookie”] [severity “CRITICAL”] [tag “WEB_ATTACK\/XSS”] [hostname “twfcb.com”] [uri “\/phpMyAdmin-4.2.9.1-all-languages\/js\/get_scripts.js.php”] [unique_id “VDYusc5sMzoAAGDzFX8AAAAh”]<\/div>\n