Yes, that vulnerability is old and the current version is safe in that aspect.
Besides directly protecting that issue, the 2.5 has changed to a black list approach, so only known safe files are allowed providing an extra protection about other unknown problems in Apache or PHP (as it was that one)
I have another question. I guess my problem is that browsing to /editor/fckeditor.html can be done by anyone and it appears (even in version 2.5) if file uploads are enabled, anyone can upload one of the approved files. We have integrated FCK into a CMS so users have to log in to use the CMS, but without logging in, non-authenticated users can still browse to /editor/fckeditor.html (if they know the path) and upload files.
How are people preventing this from happening and making sure only authenticated users can use the file upload functionality? Am I missing something really obvious here?
// SECURITY: You must explicitly enable this "connector". (Set it to "true"). // WARNING: don't just set "$Config['Enabled'] = true ;", you must be sure that only // authenticated users can access this file or use some kind of session checking.
Re: File Upload Vulnerability
Besides directly protecting that issue, the 2.5 has changed to a black list approach, so only known safe files are allowed providing an extra protection about other unknown problems in Apache or PHP (as it was that one)
Re: File Upload Vulnerability
Rob.
Re: File Upload Vulnerability
I have another question. I guess my problem is that browsing to /editor/fckeditor.html can be done by anyone and it appears (even in version 2.5) if file uploads are enabled, anyone can upload one of the approved files. We have integrated FCK into a CMS so users have to log in to use the CMS, but without logging in, non-authenticated users can still browse to /editor/fckeditor.html (if they know the path) and upload files.
How are people preventing this from happening and making sure only authenticated users can use the file upload functionality? Am I missing something really obvious here?
Thanks,
Rob.
Re: File Upload Vulnerability