-
-
Notifications
You must be signed in to change notification settings - Fork 25
Description
Some sensitive directories and files are exposed to users and can be accessed by url publicly:
inc/
vendor/.htaccess.dist
/bin/.htaccess
/inc/.htaccess
/vendor/.htaccess
Expected Behavior
All these files should not be expose as warned in https://www.dokuwiki.org/security.
Specially, the .htaccess files can be used in web-based exploitation, as mentioned in https://www.acunetix.com/vulnerabilities/web/htaccess-file-readable/. They use this file to hide malware, to redirect search engines to their own sites, and for many other purposes (hide backdoors, inject content, to modify the php.ini values, etc).
Current Behavior
These files can be accessed by url from outside users.
Steps to Reproduce
Just construct url to access these files and directories, and you can access them with 200 status returned.
Environment
OS:
CPU architecture: x86_64/arm32/arm64
How docker service was installed:
From the official docker repo linuxserver/dokuwiki.
Potential Fix
Disable the access of these files and directories in access configuration of this docker image.