1 dehein2 Sep 15, 2005 17:58
3 dehein2 Sep 15, 2005 18:20
no, its only 50kb.
btw. can i change the max. file size?
4 kweb Sep 15, 2005 18:40
You can change it in conf/_admin.php:
$fileupload_maxk = '96'; // in kilo bytes
5 dehein2 Sep 15, 2005 18:47
ok, thanks - but theres still be big problem left :)
6 kweb Sep 16, 2005 16:47
Did you make sure the non-admin user is set to the appropriate level? When a user is created, they start at level 0, but you have to be set to at least level 1 to upload images.
7 jibberjab Sep 17, 2005 07:25
This question is sort of related to the original post... The "media" folder has to be CHMOD 777. Doesn't this create a potential security problem, since the directory is world writeable/executable?
jj.
8 mr__cherry Dec 30, 2005 00:37
jibberjab wrote:
This question is sort of related to the original post... The "media" folder has to be CHMOD 777. Doesn't this create a potential security problem, since the directory is world writeable/executable?
jj.
Apparantly it does.
An Iranian hacker deleted my friend's /media directory and left this message:
http://markmaynard.com/media/hack.html
I've got him running around trying to reconstruct his media directory.
9 blueyed Dec 30, 2005 19:53
CHMOD 777 makes the folder world writable, but the hacker would need access/login to the server. You cannot delete folder contents through HTTP (browser).
Mr. Cherry, have you taken a look at your server logs to reconstruct how this happened? There might be a security hole with your(?) server.
10 blueyed Dec 30, 2005 20:52
Mr. Cherry,
there are _a lot_ of defacements for the same server IP..
http://www.zone-h.org/en/defacements/filter/filter_ip=67.19.127.66/
I'll also drop the webhosters a note.
So probably the defacer had an account on this server and attacked sites where folders where world-writable.
11 mr__cherry Dec 30, 2005 20:52
blueyed wrote:
CHMOD 777 makes the folder world writable, but the hacker would need access/login to the server. You cannot delete folder contents through HTTP (browser).
Mr. Cherry, have you taken a look at your server logs to reconstruct how this happened? There might be a security hole with your(?) server.
I'm still looking into this. I had a discussion with my server admin and he suggested it might be some software we're running on the site. I've kept up with the few security updates so I'm not convinced this happened through b2evo but it may have.
Unfortuantely I don't have access to the server logs.
I did look at other defacements by the same hacker and it looks like he's going through phpwebhosting accounts like crazy. This leads me to believe there's a security problem there.
I'm still trying to piece this together.
12 blueyed Dec 30, 2005 21:50
Without server logs this may be impossible / difficult to puzzle together on your side. I've dropped them a note, as said, and you should probably also try contacting them.
13 mr__cherry Dec 30, 2005 23:44
Ok I found that I missed the 8/31 security patch. The dates on the patched files is July 5th.
Jul 5 14:41 _functions_xmlrpc.php
Jul 5 14:41 _functions_xmlrpcs.php
:oops:
14 blueyed Dec 30, 2005 23:55
It's not said though that he broke into through this.. I don't know even what this xmlrpc security issues were really about.
15 mr__cherry Dec 31, 2005 07:57
blueyed's right, there's nothing showing that they got in through this xmlrpc hole.
16 soul_blade Mar 14, 2006 05:05
i have add $fileupload_maxk = '2048'; in _admin.php
but the Maximum allowed file size is still 96 KB
im using b2evo v 1.6-Alpha
17 blueyed Mar 14, 2006 18:58
Phoenix does not care about this setting in /conf/ (apart from when upgrading). See Settings/Files in the backoffice instead.
Did you make sure the file is not larger than the maximum size allowed? I believe the default is 96KB.