php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Return to Bug #73920
Patch yoorshop revision 2017-01-12 12:56 UTC by admin at yoorshop dot fr

Patch yoorshop for URL related Bug #73920

Patch version 2017-01-12 12:56 UTC

Return to Bug #73920 | Download this patch
Patch Revisions:

Developer: admin@yoorshop.fr

Hi, 

Even if we use CXS to protect websites, it is not sufficient sometimes, many hackers succeeded to take control over websites by injecting a pyramid of files which are not detected as exploit or virus, but rather these were efficient php scripts which we truly traveling in the site files until it got to sensitive datas. 
We saw that dozens of times this year, and it is true that some modules/templates with exploits had facilitated the job of the hacker... 

mail, sendmail are now forbidden on our servers, this is also an incredible spam expoit, and deprecated totally... 

file_uploads is a security disease on which PHP community has never made efforts to reform itselves...

We suggest : 
existing file_uploads = OFF all the time 
adding a second file_uploads_sess by ex, which can override orignal file_uploads, and which would be ON by default of course : file_uploads_sess = ON 

Conditions are authentication, only those who are authenticated successfully could send a file (only these need to be able to do that, begining by the webmaster to create his products in his shops or a blogger post his articles + pictures) : 
- webmaster through admin website 
- a user forum or client of website also for support by example : he can send a screenshot 
- for contact form without authentication : we could introduce a secondary acceptable condition : captcha 

Thanks for attention, 
John
 
PHP Copyright © 2001-2019 The PHP Group
All rights reserved.
Last updated: Thu Jun 27 03:01:25 2019 UTC