<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="ru">
	<id>http://wiki.mipt.ru/index.php?action=history&amp;feed=atom&amp;title=Security_checks</id>
	<title>Security checks - История изменений</title>
	<link rel="self" type="application/atom+xml" href="http://wiki.mipt.ru/index.php?action=history&amp;feed=atom&amp;title=Security_checks"/>
	<link rel="alternate" type="text/html" href="http://wiki.mipt.ru/index.php?title=Security_checks&amp;action=history"/>
	<updated>2026-05-06T14:40:57Z</updated>
	<subtitle>История изменений этой страницы в вики</subtitle>
	<generator>MediaWiki 1.42.1</generator>
	<entry>
		<id>http://wiki.mipt.ru/index.php?title=Security_checks&amp;diff=5351&amp;oldid=prev</id>
		<title>Олег Давидович: 1 версия импортирована</title>
		<link rel="alternate" type="text/html" href="http://wiki.mipt.ru/index.php?title=Security_checks&amp;diff=5351&amp;oldid=prev"/>
		<updated>2024-10-18T06:44:56Z</updated>

		<summary type="html">&lt;p&gt;1 версия импортирована&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;ru&quot;&gt;
				&lt;td colspan=&quot;1&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Предыдущая версия&lt;/td&gt;
				&lt;td colspan=&quot;1&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Версия от 06:44, 18 октября 2024&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-notice&quot; lang=&quot;ru&quot;&gt;&lt;div class=&quot;mw-diff-empty&quot;&gt;(нет различий)&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;</summary>
		<author><name>Олег Давидович</name></author>
	</entry>
	<entry>
		<id>http://wiki.mipt.ru/index.php?title=Security_checks&amp;diff=5350&amp;oldid=prev</id>
		<title>1&gt;Tsala: Tsala moved page Security overview report to Security checks</title>
		<link rel="alternate" type="text/html" href="http://wiki.mipt.ru/index.php?title=Security_checks&amp;diff=5350&amp;oldid=prev"/>
		<updated>2024-05-09T15:10:13Z</updated>

		<summary type="html">&lt;p&gt;Tsala moved page &lt;a href=&quot;/index.php?title=Security_overview_report&quot; class=&quot;mw-redirect&quot; title=&quot;Security overview report&quot;&gt;Security overview report&lt;/a&gt; to &lt;a href=&quot;/index.php?title=Security_checks&quot; title=&quot;Security checks&quot;&gt;Security checks&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Новая страница&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Security}}&lt;br /&gt;
A security overview report is available via &amp;#039;Security checks&amp;#039; in the Site administration &amp;quot;Reports&amp;quot; section.&lt;br /&gt;
&lt;br /&gt;
Some of the checks included are as follows:&lt;br /&gt;
&lt;br /&gt;
*[[report/security/report security check globals|Register globals]]&lt;br /&gt;
:register_globals is a PHP setting that must be disabled for Moodle to operate safely.&lt;br /&gt;
&lt;br /&gt;
*[[report/security/report security check unsecuredataroot|Insecure dataroot]]&lt;br /&gt;
:The dataroot is the directory where Moodle stores user files.  It should not be directly accessible via the web.&lt;br /&gt;
&lt;br /&gt;
*[[report/security/report security check displayerrors|Displaying of PHP errors]]&lt;br /&gt;
:If PHP is set to display errors, then anyone can enter a faulty URL causing PHP to give up valuable information about directory structures and so on.&lt;br /&gt;
&lt;br /&gt;
*[[Vendor directory security check|Vendor directory]]&lt;br /&gt;
:The vendor directory should not be present on public sites.&lt;br /&gt;
&lt;br /&gt;
*[[report/security/report security check noauth|No authentication]]&lt;br /&gt;
:Use of the &amp;quot;no authentication&amp;quot; plugin can be dangerous, allowing people to access the site without authenticating. &lt;br /&gt;
&lt;br /&gt;
*[[report/security/report security check embed|Allow EMBED and OBJECT]]&lt;br /&gt;
:Allowing ordinary users to embed Flash and other media in their texts (eg forum posts) can be a problem because those rich media objects can be used to steal admin or teacher access, even if the media object is on another server.&lt;br /&gt;
&lt;br /&gt;
*[[report/security/report_security_check_preventexecpath|Execuable paths]]&lt;br /&gt;
:Allowing executable paths to be set via the Admin GUI is a vector for privilege escalation. This can be prevented by setting the following config.php: &amp;lt;code php&amp;gt;$CFG-&amp;gt;preventexecpath = true;&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*[[report/security/report security check mediafilterswf‎|Enabled .swf media filter]]&lt;br /&gt;
:Even the flash media filter can be abused to include malicious flash files.&lt;br /&gt;
&lt;br /&gt;
*[[report/security/report security check openprofiles|Open user profiles]]&lt;br /&gt;
:User profiles should not be open to the web without authentication, both for privacy reasons and because spammers then have a platform to publish spam on your site.&lt;br /&gt;
&lt;br /&gt;
*[[report/security/report security check google|Open to Google]]&lt;br /&gt;
:Allowing Google to enter your site means that all the contents become available to the world.  Don&amp;#039;t use this unless it&amp;#039;s a really public site.&lt;br /&gt;
&lt;br /&gt;
*[[report/security/report security check passwordpolicy|Password policy]]&lt;br /&gt;
:Using a password policy will force your users to use stronger passwords that are less susceptible to being cracked by a intruder.&lt;br /&gt;
&lt;br /&gt;
*[[Password salting|Password salt]]&lt;br /&gt;
:Setting a password salt greatly reduces the risk of password theft.&lt;br /&gt;
&lt;br /&gt;
*[[report/security/report security check emailchangeconfirmation‎|Email change confirmation]]&lt;br /&gt;
:You should generally always force users to confirm email address changes via an extra step where a confirmation link is sent to the user.&lt;br /&gt;
&lt;br /&gt;
*[[report/security/report security check cookiesecure|Secure cookies]]&lt;br /&gt;
:It is recommended to use secure cookies only when serving over SSL.&lt;br /&gt;
&lt;br /&gt;
*[[report/security/report security check configrw|Writable config.php]]&lt;br /&gt;
:The config.php file must not be writeable by the web server process.  If it is, then it is possible for another vulnerability to allow attackers to rewrite the Moodle code and display whatever they want.&lt;br /&gt;
&lt;br /&gt;
*[[report/security/report security check riskxss|XSS trusted users]]&lt;br /&gt;
:Make sure that you trust all the people on this list:  they are the ones with permissions to potentially write XSS exploits in forums etc.&lt;br /&gt;
&lt;br /&gt;
*[[report/security/report security check riskadmin|Administrators]]&lt;br /&gt;
:Review your administrator accounts and make sure you only have what you need.&lt;br /&gt;
&lt;br /&gt;
*[[Backup of user data]]&lt;br /&gt;
:Make sure that only roles that need to backup user data can do so and that all users who have the capability are trusted.&lt;br /&gt;
&lt;br /&gt;
*[[report/security/report security check defaultuserrole‎ |Default role for all users]]&lt;br /&gt;
:This checks that the registered user role is defined with sane permissions.&lt;br /&gt;
&lt;br /&gt;
*[[report/security/report security check guestrole|Guest role]]&lt;br /&gt;
:This checks that the guest role is defined with sane permissions.&lt;br /&gt;
&lt;br /&gt;
*[[report/security/report security check frontpagerole‎|Frontpage role]]&lt;br /&gt;
:This checks that the frontpage user role is defined with sane permissions.&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
&lt;br /&gt;
* [http://moodle.org/mod/forum/view.php?id=7301 Security and Privacy forum] on moodle.org&lt;br /&gt;
&lt;br /&gt;
[[Category:Report]]&lt;br /&gt;
[[Category:Site administration]]&lt;br /&gt;
&lt;br /&gt;
[[de:Sicherheitsbericht]]&lt;br /&gt;
[[es:Reporte Vista general de Seguridad]]&lt;br /&gt;
[[eu:Seguratasunaren_ikuspegi_orokorra]]&lt;br /&gt;
[[fr:Panorama de sécurité]]&lt;br /&gt;
[[ja:セキュリティオーバービュー]]&lt;/div&gt;</summary>
		<author><name>1&gt;Tsala</name></author>
	</entry>
</feed>