Restrict Malicious File Uploads

At present, malicious scripts or other malicious file types can be uploaded to the backend via any form ‘upload’ button.

This leaves Treepl/WebInOne vulnerable and has the potential to allow hackers to access personal CMS data collected via forms. This is a serious threat and must be resolved as data security becomes an increasingly high priority due to the huge number of breaches we hear of or experience on other high profile platforms.

A South Korean client recently had a security breach and data leak in their Australian database. Jobs were lost and the agency was cut. They are now putting all their agencies in all countries through a series of penetration tests to ensure security protocols are in place. Including my agency in New Zealand. I am the only supplier of theirs that utilises the Treepl platform.

While Treepl withstood all other tests, the platform failed the portion of this test with regards to malicious file uploads. While file types are restricted within a promotion fulfilment form, the hacker was able to upload a permissible file type, then change the extension which then activates the malicious script file.

The Treepl team have advised they can fix this but requires a whole platform update, therefore they have asked for a public backlog request so the back end department can review and groom the update.

Please vote and accelerate this to action the update. The hackers will be retesting in February.

4 Likes

On version 7 sites, there is now ‘Server File Settings’ available under “Settings” > “Misc” which I assume block file types of your choosing from the file manager (both admin uploads and form submissions?):

1 Like

I upgraded the site to v7 and added a list of forbidden file types (below). The site was then tested by professional hackers at the end of February. It passed with no penetration, and in particular no malicious files were able to be uploaded. Very happy with the outcome, as are my clients.

3 Likes