Disclose a vulnerability
Please contact security at tikiwiki.org with details on any flaw you find. A responsive group of knowledgable people will answer promptly and will fix the problem in coordination with you, if your plan is to publish an advisory. We welcome such reports very much!
Always use the latest stable version from the Get Tiki page.
... below is the old content of this page, with some general unsorted security information ... Cross-Site Request Forgeries (CSRF)Taken from PHP Under Attack:
< img src="http://top-secret-site.com/vulnerable.cgi?action=trusteduseraction&user=gullibledude"> The following is an article from ApacheCon - very good reading.
Here are some pieces of background for your personnal knowledge :
Jun 13, 2001 bugtraq at securityfocus.com
2003/07 php conference at oscon 2003
PHP Under Attack
PHP Under Attack OSCON 2003 (slide)
PHP Quebec 2005, Security and common vulnerabilities
Read documentation in comments of file lib/tikiticketlib.php :
List of Security issues Past
Easy DOS?
Security issues when developing Tiki
Writing secure codeGo here for this topic: SecurityRules
How to Secure Tiki
Content in filesystemWhile most of the data in Tiki is stored in a database, some can be stored in filesystem, like file or image galleries, or backups. Those directories could be outside the web tree (but accessable from apache/php), or have some restriction preventing the webserver from accessing them directly, i.e. for apache servers a file named .htaccess could be put in those directories with something like ))AuthType(( Basic
This should work in any directory which content should not be accesible directly, but what happens with i.e. img/wiki_up? For those dirs in apache configuration could be made, i.e. adding a directory directive for the wiki_up directory, and inside that directive, a files ".php" directive to block the loading from that dir of php files (and could be done more for other kind of executable files that could be put there, i.e. shtml) much like the disabling of loading .htaccess files is already done in apache configuration.
Protecting the Apache ))WebServer((modsecurity
modrewrite
Copy to clipboard
Protecting from PHP running in unsolicited locationsConsider setting php_openbasedir value in .htaccess or your vhost setup. As an example, take a look at the code below: Copy to clipboard
Disable execution of PHP by defaultDisable PHP execution by default and then enable it for directories that should be accessible by Apache.
Copy to clipboard
Using Admin SecuritySee here: AdminSecurity PHP SettingsSome suggested php.ini settings. The last one is needed though for Blog Trackback Pings to work. register_globals = Off
Apply a "web-application-firewall"Use Request and Bandwith LimitingHowToApacheModCbandRateLimiting in tikiwiki internal admin/general page set "disallow access to site if load is above threshold" , set threshold to reasonable load, say 7 |