Skip to content

Sensitive files are exposed #33

@conf-test

Description

@conf-test

linuxserver.io


Some sensitive directories and files are exposed to users and can be accessed by url publicly:
inc/
vendor/.htaccess.dist
/bin/.htaccess
/inc/.htaccess
/vendor/.htaccess

Expected Behavior

All these files should not be expose as warned in https://www.dokuwiki.org/security.

Specially, the .htaccess files can be used in web-based exploitation, as mentioned in https://www.acunetix.com/vulnerabilities/web/htaccess-file-readable/. They use this file to hide malware, to redirect search engines to their own sites, and for many other purposes (hide backdoors, inject content, to modify the php.ini values, etc).

Current Behavior

These files can be accessed by url from outside users.

Steps to Reproduce

Just construct url to access these files and directories, and you can access them with 200 status returned.

Environment

OS:
CPU architecture: x86_64/arm32/arm64
How docker service was installed:

From the official docker repo linuxserver/dokuwiki.

Potential Fix

Disable the access of these files and directories in access configuration of this docker image.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions