Vital Security: Restrict access to upload folders (.htaccess)
To restrict accessing / executing php or other scripts from uploads or other restricted folders, use this code in .htaccess file put in that upload folder. If possible please have ownership of this .htaccess file as root and not your web server to prevent overwriting.
This is syntax for an Apache webserver.
1. Ownership
Ensure your upload directories are owned by whatever process runs your web server (usually www-data or apache) - and ensure permissions are set to 766 - 755 if this causes problems, and never 777! (I would prefer 666 but this seems to break the app)
chown apache:apache -R uploads/
chmod 766 -R uploads/
I would set htaccess to be r/w by owner (root) and read by group/world
chmod 644 .htaccess
2 .htaccess
SO if possible I wouldn't use .htaccess, and use the main config file instead (Allow Overrides none) but if you do, then follow this guidance. Generally, htaccess is owned by the web process (www-data or apache) however in this instance as opencats will not rewrite it, it's more secure if .htaccess is owned and writable by root only.
This would need a htaccess of this type installed in
opencats/upload, and
opencats/attachments
for Apache 2.2
# Don't list directory contents
IndexIgnore *
# Disable script execution
AddHandler cgi-script .php .php2 .php3 .php4 .php5 .php6 .php7 .php8 .php9 .pl .py .js .jsp .asp .htm .html .shtml .sh .cgi
Options -ExecCGI -Indexes
# Only the following file extensions are allowed (pdf, rtf, odt, doc, docx, txt, wpd)
Order Allow,Deny
Deny from all
<FilesMatch "\.([Pp][Dd][Ff]|[Dd][Oo][Cc][Xx]?|[Rr][Tt][Ff]|[Oo][Dd][Tt]|[Tt][Xx][Tt]|[Ww][Pp][Dd])$">
Allow from all
</FilesMatch>
On Apache 2.4 the syntax changes - therefore
IndexIgnore *
# Disable script execution
AddHandler cgi-script .php .php2 .php3 .php4 .php5 .php6 .php7 .php8 .php9 .pl .py .js .jsp .asp .htm .html .$
Options -ExecCGI -Indexes
#grant access if word-processing format
<FilesMatch "(?i)\.(pdf|docx?|rtf|odt?g?|txt|wpd|jpe?g|png|csv|xlsx?|ppt|msg|heic|tiff?|html?|bmp|wps|xps)$">
Require all granted
</FilesMatch>
Finally of course - test, test, test.. once you add your htaccess file, please try to upload valid and invalid files.
3. /etc/apache/apache.conf instead
So the most secure option is to configure your restrictions in apache.conf and to ignore .htaccess files (so if for some reason someone managed to upload a .htaccess file then it'll be ignored)
For Opencats, sample restrictions to add to apache.conf config would be as below;
<Directory /var/www/>
Options -Indexes +FollowSymLinks
AllowOverride None
Require all granted
</Directory>
<Directory /var/www/html/OpenCATS-0.9.6/upload>
IndexIgnore *
# Disable script execution
AddHandler cgi-script .php .php2 .php3 .php4 .php5 .php6 .php7 .php8 .php9 .pl .py .js .jsp .asp .htm .html .$
Options -ExecCGI -Indexes
# Only permit particular filetypes
<FilesMatch "(?i)\.(pdf|docx?|rtf|odt?g?|txt|wpd|jpe?g|png|csv|xlsx?|ppt|msg|heic|tiff?|html?|bmp|wps|xps)$">
Require all granted
</FilesMatch>
</Directory>
<Directory /var/www/html/OpenCATS-0.9.6/attachments>
IndexIgnore *
# Disable script execution
AddHandler cgi-script .php .php2 .php3 .php4 .php5 .php6 .php7 .php8 .php9 .pl .py .js .jsp .asp .htm .html .$
Options -ExecCGI -Indexes
<FilesMatch "(?i)\.(pdf|docx?|rtf|odt?g?|txt|wpd|jpe?g|png|csv|xlsx?|ppt|msg|heic|tiff?|html?|bmp|wps|xps)$">
Require all granted
</FilesMatch>
</Directory>
Reference material
https://blog.devolutions.net/2019/12/how-to-prevent-file-upload-vulnerabilities
https://stackoverflow.com/questions/5689423/how-to-ban-all-executable-files-on-apache
https://stackoverflow.com/questions/6368777/how-to-prevent-uploaded-file-from-being-executed
https://www.sitepoint.com/community/t/securing-image-upload-directory-via-htaccess/44659
https://tomolivercv.wordpress.com/2011/07/24/protect-your-uploads-folder-with-htaccess/
https://github.com/Leuchtfeuer/typo3-secure-downloads/blob/master/Resources/Private/Examples/_.htaccess
Last updated