You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
if the files inside the zip archives have a path like "../../../somewhere/et cetera.", adm will extract the file at this location.
This should not be allowed (or at least not by default), as it poses a security risk.
(during an audit, we managed to take control of our preproduction server by uploading such a .zip on the website : instead of exctracting his file on the user files dir, where they were inactive and blocked, he injected a .php script in the apache directory)
The text was updated successfully, but these errors were encountered:
if the files inside the zip archives have a path like "../../../somewhere/et cetera.", adm will extract the file at this location.
This should not be allowed (or at least not by default), as it poses a security risk.
(during an audit, we managed to take control of our preproduction server by uploading such a .zip on the website : instead of exctracting his file on the user files dir, where they were inactive and blocked, he injected a .php script in the apache directory)
The text was updated successfully, but these errors were encountered: