X-Git-Url: http://git.vanrenterghem.biz/git.ikiwiki.info.git/blobdiff_plain/e16746a52f40f478af1b634c532d90c25cc0ec76..8f5d3267619da5325eb2d46ce7d9744964e6b9a2:/doc/security.mdwn?ds=sidebyside diff --git a/doc/security.mdwn b/doc/security.mdwn index fea0eb727..72ae8f4b9 100644 --- a/doc/security.mdwn +++ b/doc/security.mdwn @@ -18,7 +18,7 @@ _(The list of things to fix.)_ Anyone with direct commit access can forge "web commit from foo" and make it appear on [[RecentChanges]] like foo committed. One way to avoid -this would be to limit web commits to those done by a certian user. +this would be to limit web commits to those done by a certain user. ## other stuff to look at @@ -80,7 +80,7 @@ they can try to use this to exploit your web server. _(AKA, the assumptions that will be the root of most security holes...)_ -## exploting ikiwiki with bad content +## exploiting ikiwiki with bad content Someone could add bad content to the wiki and hope to exploit ikiwiki. Note that ikiwiki runs with perl taint checks on, so this is unlikely. @@ -158,6 +158,20 @@ allowed, so that's not a problem.) ---- +# Plugins + +The security of [[plugins]] depends on how well they're written and what +external tools they use. The plugins included in ikiwiki are all held to +the same standards as the rest of ikiwiki, but with that said, here are +some security notes for them. + +* The [[plugins/img]] plugin assumes that imagemagick/perlmagick are secure + from malformed image attacks. Imagemagick has had security holes in the + past. To be able to exploit such a hole, a user would need to be able to + upload images to the wiki. + +---- + # Fixed holes _(Unless otherwise noted, these were discovered and immediately fixed by the