Details
-
Sub-task
-
Status: Closed
-
Minor
-
Resolution: Fixed
-
22.01.01
-
None
-
Bug Crush Event - 21/2/2015
Description
An external security reporter brought to our attention that a signed up user could upload a webshell using string concatenation. Of course there is no reason for a signed up user to upload a webshell. And anyway we don't create CVEs for signed up users trying our security.
Nevertheless we have decided to fix this possibility while allowing to bypass it using a new security property. The later can be usefull when a file must contain a string concatenation, images files, seen as encoded texts, come to mind.