Hi,

On 19-3-2011 18:02, Thomas "Thasmo" Deinhamer wrote:
Andreas Becker wrote:
How to get access to the backend you can contact me via PM. IMHO it
is not good to discuss this here on the list as actually everyone
can already read how to get inside TYPO3 if the developers and site
adminstrators don't take at least common security measures into
account.

There is plenty of information around how to take the common security measures. The TYPO3 installation warns for many common security problems (default admin account, default install tool password, etc.) in various places in the backend. If you still leave those things open it's not anything which cannot be discussed in public places.

If you know of ways to get access to installations which have the normal security measure taken into account you should report this ASAP to the TYPO3 security team and not discuss it with anybody else.

Does that mean there are ways to get into the backend without having
the login credentials?

Or why would it be a secret or unwise to tell here?

It's not a real secret and it will only work if you have ftp or ssh access with enough rights to create and modify certain files. This is a pretty normal procedure IMO and not a trade secret. It used to be part of the old installation method, until a more user friendly installer (and for 4.6 there is a project to overhaul the whole install tool) was created.

In order to get access to your backend you can use the install tool to create a new admin user (this is a normal option in the install tool). To get access to your install tool there must be a file named ENABLE_INSTALL_TOOL in the typo3conf directory and the file may not be older than 1 hour. If your install tool password doesn't work you can edit the typo3conf/localconf.php file and set an MD5-hash of the desired Install Tool password in that file.

As you can see, this requires that you have access to these files and enough rights to create and/or modify them.

If your installation is hacked it would be best to reinstall the entire server from scratch and restore the database and certain user files (images, etc.) from backups (after manually checking them for signs of hacks). The next best thing is to change each and every password in your installation (control panel, root password, FTP, SSH, database, install tool, BE users, etc.). Because it happens rather frequently that login information is harvested from infected computers, all users who have some form of backend or server access should have all their computers checked for malware.

--
Kind regards / met vriendelijke groet,

Jigal van Hemert.
_______________________________________________
TYPO3-english mailing list
TYPO3-english@lists.typo3.org
http://lists.typo3.org/cgi-bin/mailman/listinfo/typo3-english

Reply via email to