User tests: Successful: Unsuccessful:
Pull Request for Issue # .
media
folder.htaccess
to each filesystem-local folder (defaults to false for b/c)media/test.php
with contents <?= phpinfo();
/administrator/index.php?option=com_plugins&view=plugins
and edit the filesystem local plugin by enabling the Strengthen Security
switchimages/test.php
with contents <?= phpinfo();
/administrator/index.php?option=com_plugins&view=plugins
and edit the filesystem local plugin by disabling the Strengthen Security
switch.htaccess
filePHP execution inside the static folders
PHP execution is prevented inside the static folders
Please select:
Documentation link for docs.joomla.org:
No documentation changes for docs.joomla.org needed
Pull Request link for manual.joomla.org:
No documentation changes for manual.joomla.org needed
Status | New | ⇒ | Pending |
Category | ⇒ | Administration com_content com_menus Language & Strings Repository NPM Change JavaScript Front End Plugins |
Labels |
Added:
Language Change
NPM Resource Changed
PR-5.1-dev
|
Category | Administration com_content com_menus Language & Strings Repository NPM Change JavaScript Front End Plugins | ⇒ | Administration com_content Language & Strings Repository NPM Change JavaScript Front End Plugins |
Category | Administration com_content Language & Strings Repository NPM Change JavaScript Front End Plugins | ⇒ | Administration Language & Strings Repository NPM Change JavaScript Front End Plugins |
Category | Administration Language & Strings Repository NPM Change JavaScript Front End Plugins | ⇒ | Administration Language & Strings Repository NPM Change Front End Plugins |
Status | Pending | ⇒ | Closed |
Closed_Date | 0000-00-00 00:00:00 | ⇒ | 2023-10-12 12:22:17 |
Closed_By | ⇒ | dgrammatiko |
Status | Closed | ⇒ | Pending |
Category | Administration Language & Strings Repository NPM Change Front End Plugins | ⇒ | Administration Language & Strings Repository NPM Change Front End Plugins Unit Tests |
Labels |
Added:
?
|
@brianteeman I totally agree that it's better to have secure by default ootb. The only problems are:
thus this middle ground PR. Without enabling the new option only the media
folder gets the php exclusion, which should have zero effects, as that folder should never have php files.
But if the maintainers feel that going full blast is ok for a patch version then someone with better apache knowledge should take over
@brianteeman I totally agree that it's better to have secure by default ootb. The only problems are:
- that it cannot happen in a patch version (if I'm not wrong)
See comment below
- it will impact heavily some extensions (and by extension end users)
If there really are extensions that allow direct access to any php files anywhere then they are cr*p and I dont care about them. There are very very very few legitimate cases for direct entry points such as the one in core for joomlaupdate
thus this middle ground PR. Without enabling the new option only the
media
folder gets the php exclusion, which should have zero effects, as that folder should never have php files. But if the maintainers feel that going full blast is ok for a patch version then someone with better apache knowledge should take over
If there are extensions abusing the non-media folders then there is no reason to assume that they are not also abusing the media folder.
I really dont see this as being anything more complex than previous changes to the core htaccess file which have always been for new installs only plus a post-installation message for existing sites. Exactly the same as seen in this PR #30221
Status | Pending | ⇒ | Closed |
Closed_Date | 2023-10-12 12:22:17 | ⇒ | 2023-11-30 09:51:53 |
Labels |
Added:
Feature
?
Removed: ? |
I am not a fan of this approach although I do agree with its intentions.
Instead of allowing php to be executable in every folder and then adding a deny file in every media folder I would simply suggest adding a deny all in the root htaccess and then people can add exceptions to that rule.
For the core there are only a few exceptions