Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Directory listing vulnerability #1

Open
ShiiFu opened this issue May 3, 2022 · 0 comments
Open

Directory listing vulnerability #1

ShiiFu opened this issue May 3, 2022 · 0 comments

Comments

@ShiiFu
Copy link

ShiiFu commented May 3, 2022

Hi,

Linshare docker use default Apache configuration. The httpd.conf of the repo seems to not be used.

Linshare code is downloaded into default htdocs folder which allow Indexes and FollowSymLinks in Apache configuration. So we have some directory listing vulnerabilities, at least on these URLs :

  • /config/
  • /css/
  • /js/

Note that same URLs are impacted on linshare-ui-user-dockerfile.

A directory listing have a default CVSS score of 5.3, which is too high for some security certifications. We are able to justify that the vulnerability is less important but it is preferable to fix it.

On our instance, I fixed it by adding following command to the Dockerfile in order to remove unwanted options : sed -i '/Options Indexes FollowSymLinks/d' /usr/local/apache2/conf/httpd.conf

If you agree with this fix, I can do a PR on both repositories.

May be a refactoring of the dockerfile is needed in order to be able to push a custom Apache configuration.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant