We actively support the following versions of SecureFileHub with security updates:
| Version | Supported |
|---|---|
| 1.0.x | β Yes |
| < 1.0 | β No |
We take security vulnerabilities seriously. If you discover a security vulnerability in SecureFileHub, please follow these steps:
DO NOT open a public GitHub issue for security vulnerabilities.
Instead, please email us directly at: jerickalmeda@gmail.com
Include the following information:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Any proof-of-concept code (if applicable)
- Your contact information
- Initial Response: Within 48 hours
- Vulnerability Assessment: Within 7 days
- Fix Development: Within 30 days (depending on severity)
- Public Disclosure: After fix is released
We appreciate security researchers who help keep SecureFileHub safe. With your permission, we will:
- Credit you in the security advisory
- Add you to our hall of fame
- Provide a recommendation letter (if requested)
// Always change default credentials
define('FM_USERNAME', 'your_secure_username');
define('FM_PASSWORD', 'YourVeryStrongPassword123!');# Restrict access by IP (Apache)
<Files "filemanager.php">
Require ip 192.168.1.0/24
Require ip 10.0.0.0/8
</Files># Restrict access by IP (Nginx)
location /filemanager.php {
allow 192.168.1.0/24;
allow 10.0.0.0/8;
deny all;
}// Use dedicated database user with minimal privileges
define('DB_USERNAME', 'filemanager_user'); // Not root!
define('DB_PASSWORD', 'SecureDBPassword123!');
// Grant only necessary privileges:
// GRANT SELECT, INSERT, UPDATE, DELETE ON app_db.* TO 'filemanager_user'@'localhost';// Set restrictive root path
define('FM_ROOT_PATH', '/var/www/secure_files');
// Never use system root
// define('FM_ROOT_PATH', '/'); // β DANGEROUS!- Always use HTTPS in production
- Implement HTTP to HTTPS redirects
- Use strong SSL/TLS certificates
// Configure secure session settings
ini_set('session.cookie_secure', 1); // HTTPS only
ini_set('session.cookie_httponly', 1); // No JavaScript access
ini_set('session.use_strict_mode', 1); // Strict session handling- Enable PHP error logging
- Monitor file access patterns
- Set up intrusion detection
- Regular security audits
- Keep PHP updated
- Update web server software
- Monitor for security advisories
- Apply patches promptly
- Single User System: Currently supports only one admin user
- File Type Restrictions: Limited to predefined safe file types
- No Rate Limiting: No built-in protection against brute force
- Session Storage: Uses default PHP session storage
- Multi-user support with role-based access
- Two-factor authentication (2FA)
- Rate limiting for login attempts
- File integrity checking
- Audit logging
- API key authentication option
- CSRF Protection: All forms use CSRF tokens
- Path Sanitization: Prevents directory traversal attacks
- Session Management: Secure session handling with timeouts
- Input Validation: All user inputs are validated and sanitized
- SQL Injection Protection: PDO with prepared statements
- File Type Restrictions: Only safe file types for editing
- Authentication Required: All operations require valid login
// Path sanitization
function sanitizePath($path);
// CSRF token management
function generateCSRFToken();
function validateCSRFToken($token);
// Authentication checks
function isAuthenticated();
function updateLastActivity();
// Real path validation
function getRealPath($path);- Web Application Security Principles
- Secure Coding Practices
- Database Security Best Practices
- Server Hardening Guidelines
In case of active exploitation:
-
Immediate Actions:
- Take the application offline
- Change all passwords
- Review access logs
- Backup current state for analysis
-
Assessment:
- Determine scope of compromise
- Identify affected systems
- Document the incident
-
Recovery:
- Apply security patches
- Restore from clean backups
- Implement additional protections
- Monitor for continued threats
-
Communication:
- Notify affected users
- Report to authorities if required
- Document lessons learned
- Security Issues: jerickalmeda@gmail.com
- General Support: GitHub Issues
- Security Advisory: Will be posted on GitHub Security tab
π Security is a shared responsibility. Thank you for helping keep SecureFileHub secure!