Something else to consider for the security conscious: If possible, don't 
have the lib directory, and Cake core code viewable via the web server.  

Ideally, the website root would be pointing to app/webroot, so direct 
access to some of those programs is not available. 

On Thursday, 11 April 2013 17:37:56 UTC+10, John Abat wrote:
>
> Hi there,
>
> I hope anyone can share some knowledge about this: 
> We are regularly building our web applications with cakephp and some of 
> our clients demand a thorough security check before going live.  
> Recently one of these checks reveled a high risk of Command Injection and 
> the most vulnerable file being /lib/Cake/Utility/file.php. 
>
> Other issues: 
>
>    - Stored Code Injection
>    - XSRF (this can be contained with the Security component)
>    - Information Leak Through Persistent Cookies
>    
> Other vulnerable files mentioned
>
> cookiecomponent.php
> cakesocket.php
> consoleinput.php
>
>
> Since these are all cake core files I wonder if these are known issues and 
> if anyone has some information on this.
>
> Thanx!
>

-- 
Like Us on FaceBook https://www.facebook.com/CakePHP
Find us on Twitter http://twitter.com/CakePHP

--- 
You received this message because you are subscribed to the Google Groups 
"CakePHP" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to cake-php+unsubscr...@googlegroups.com.
To post to this group, send email to cake-php@googlegroups.com.
Visit this group at http://groups.google.com/group/cake-php?hl=en.
For more options, visit https://groups.google.com/groups/opt_out.


Reply via email to