Recent Topics

1 Sep 15, 2005 17:58    

Hey,
i have a problem uploading the pictures. When trying to upload as admin everything works fine. And i have chmod -ed the media filder 777.
But when a non admin user trys to upload a file i get the following error:

Konnte Datei nicht hochladen. Zielverzeichnis: /srv/www/blog/media/kopie.jpg

thanks alot

2 Sep 15, 2005 18:03

Did you make sure the file is not larger than the maximum size allowed? I believe the default is 96KB.

3 Sep 15, 2005 18:20

no, its only 50kb.
btw. can i change the max. file size?

4 Sep 15, 2005 18:40

You can change it in conf/_admin.php:

$fileupload_maxk = '96'; // in kilo bytes

5 Sep 15, 2005 18:47

ok, thanks - but theres still be big problem left :)

6 Sep 16, 2005 16:47

Did you make sure the non-admin user is set to the appropriate level? When a user is created, they start at level 0, but you have to be set to at least level 1 to upload images.

7 Sep 17, 2005 07:25

This question is sort of related to the original post... The "media" folder has to be CHMOD 777. Doesn't this create a potential security problem, since the directory is world writeable/executable?

jj.

8 Dec 30, 2005 00:37

jibberjab wrote:

This question is sort of related to the original post... The "media" folder has to be CHMOD 777. Doesn't this create a potential security problem, since the directory is world writeable/executable?

jj.

Apparantly it does.

An Iranian hacker deleted my friend's /media directory and left this message:
http://markmaynard.com/media/hack.html

I've got him running around trying to reconstruct his media directory.

9 Dec 30, 2005 19:53

CHMOD 777 makes the folder world writable, but the hacker would need access/login to the server. You cannot delete folder contents through HTTP (browser).

Mr. Cherry, have you taken a look at your server logs to reconstruct how this happened? There might be a security hole with your(?) server.

11 Dec 30, 2005 20:52

blueyed wrote:

CHMOD 777 makes the folder world writable, but the hacker would need access/login to the server. You cannot delete folder contents through HTTP (browser).

Mr. Cherry, have you taken a look at your server logs to reconstruct how this happened? There might be a security hole with your(?) server.

I'm still looking into this. I had a discussion with my server admin and he suggested it might be some software we're running on the site. I've kept up with the few security updates so I'm not convinced this happened through b2evo but it may have.

Unfortuantely I don't have access to the server logs.

I did look at other defacements by the same hacker and it looks like he's going through phpwebhosting accounts like crazy. This leads me to believe there's a security problem there.

I'm still trying to piece this together.

12 Dec 30, 2005 21:50

Without server logs this may be impossible / difficult to puzzle together on your side. I've dropped them a note, as said, and you should probably also try contacting them.

13 Dec 30, 2005 23:44

Ok I found that I missed the 8/31 security patch. The dates on the patched files is July 5th.


Jul  5 14:41 _functions_xmlrpc.php
Jul  5 14:41 _functions_xmlrpcs.php

:oops:

14 Dec 30, 2005 23:55

It's not said though that he broke into through this.. I don't know even what this xmlrpc security issues were really about.

15 Dec 31, 2005 07:57

blueyed's right, there's nothing showing that they got in through this xmlrpc hole.

16 Mar 14, 2006 05:05

i have add $fileupload_maxk = '2048'; in _admin.php

but the Maximum allowed file size is still 96 KB

im using b2evo v 1.6-Alpha

17 Mar 14, 2006 18:58

Phoenix does not care about this setting in /conf/ (apart from when upgrading). See Settings/Files in the backoffice instead.


Form is loading...