Replies: 11 comments 17 replies
-
The TinyMCE image upload feature uses the public files API endpoint. This endpoint is open to any registered user. So while the TinyMCE editor is the source of most of these files, in theory any registered user can upload a file to it. They do not need to use TinyMCE. As Alec said, I think our three main use cases are:
I'd like to explore some sensible default settings for the public files which will limit misuse while keeping the feature available for these use cases. For example, can we limit public file uploads to certain user roles? Should we require email addresses to be validated by default (configuration option is off by default now)? Do we require some meaningful activity (like author with at least one submission passed desk rejection) before allowing access? |
Beta Was this translation helpful? Give feedback.
-
For me, OJS/OMP/OPS are conceptually different from public platforms like forums and blogs. All published content in OJS/OMP/OPS is reviewed and approved to some extent by an Editor. The notable exception here is image upload by anonymous users since images are immediately published and available via a public URL. There's no means for OJS/OMP/OPS users to flag inappropriate images or for JMs/PMs to monitor, moderate or remove images once they've been uploaded. My vote would be to remove the ability of anonymous users to publish images via a public URL and to align this feature set with the moderation requirements at the core of OJS/OMP/OPS that require oversight for content that is publicly published. At the moment there are no reader-facing features that rely on anonymous profile photos. If we want to continue to support anonymous profile photos, these could still be selectively displayed on pages that require them, e.g. user profile page, but via a user session as opposed to a public URL. For trusted roles, including JMs and Editors, there would still be a benefit to not using public URLs for profile photos. For example, Editors may want to use profile photos internally as visual cues for managing submission assignments, but this wouldn't imply that these team photos should be publicly accessible. Typically this sort of private/public distinction is managed and set by each user in the user profile settings. For Author verification, email address validation seems insufficient to me since it'll still be easy for anonymous users to complete this step. |
Beta Was this translation helpful? Give feedback.
-
I think that, with the implementation of the Library (and the latest update that allows file replacement), file uploading from the editor should be limited to editors only. If an important point is the profile picture (which I don't see the use of yet) you can use Gravatar, which has a public picture that is compatible with several sites. |
Beta Was this translation helpful? Give feedback.
-
Another thing that came to my mind... If a user uploads sensitive content (let's say a pirate movie) through the submission files, even though the files are not publicly accessible (unless the user share his login and turn it into a kind of Google Drive), is the host responsible for storing it? 🤔 |
Beta Was this translation helpful? Give feedback.
-
During the uploading of the image by the user in the public directory, a URL is generated and the full path to the public folder is provided. By using this path one can directly access the uploaded image. |
Beta Was this translation helpful? Give feedback.
-
The largest pain point for us is that there is no way for a Manager or Editor (or even the user themselves) to delete a file uploaded to the public files. This means that when a user abuses uploads, only a system administrator with read/write directly to the filesystem is able to remediate the unwanted content. |
Beta Was this translation helpful? Give feedback.
-
Pues perdonad si no es una propuesta popular, pero yo cortaría por lo sano y solo dejaría subir imágenes de perfil a:
A su vez, no veo ninguna necesidad de ofrecer la posibilidad de cargar imágenes via tinyMCE en campos de texto a roles que no sean del staff de la revista. Para mi es mucho más importante que OJS se perciba como una aplicación segura (se que lo es, pero los rumores son tóxicos) que permitir a un usuario subir una imagen en la bio (funcionalidad que, por cierto, nunca he visto usar bien). |
Beta Was this translation helpful? Give feedback.
This comment was marked as off-topic.
This comment was marked as off-topic.
-
Hi everyone, I'm not sure if this discussion is still relevant, but I wanted to mention that while the TinyMCE image upload uses the API, the "profile image upload" field on the public profile page does not. This means that while the controlPublicFiles plugin can prevent image uploads in TinyMCE, malicious users are still capable of defacing the site via the regular profile picture upload. |
Beta Was this translation helpful? Give feedback.
-
We're dealing with this problem too, where we keep getting panicked emails from central IT departments from various institutions. The controlPublicFiles plugin works, but doesn't solve the problem. Also, it needs to be enabled and configured at the journal level vs system wide and inherited by the journals. I think simply disabling all image uploads for anyone with only a reader / author / reviewer role would 100% solve this problem. I've never seen a journal that uses an author's profile picture. |
Beta Was this translation helpful? Give feedback.
-
So we decided to try blocking direct access to images as outline here: https://techexpert.tips/apache/apache-blocking-direct-access-image/ This leaves the option to upload images available for all users and counters the approach that these "hackers" are taking where they're just looking to have a public link with the journal's domain. I'm assuming that any images uploaded through the profile pic form, or any of the text boxes at the reader / author / reviewer level are never displayed anywhere publicly on the site. |
Beta Was this translation helpful? Give feedback.
-
Description of the issue
There are two features that allow end users to upload files inside the public files directory:
In the wild, people have registered for accounts in OJS/OMP/OPS and used these features to upload images claiming to have hacked the site. These have caused IT departments to overreact, believing a hack has occurred.
There are numerous support forum threads discussing this:
PKP has discussed the issue in a blog post. However, we are still receiving reports.
Work-arounds
There are several work-arounds available:
public_user_dir_size
to0
inconfig.inc.php
to disable TinyMCE-based user image uploadsHowever, user image upload capability is a useful feature and disabling it is not a good solution.
Information Needed
What is the difference between OJS/OMP/OPS's image upload feature, which is causing worry among IT administrators, and other image uploads (like a Twitter profile image or a Discourse forum image) that do not raise these concerns?
Candidates:
Related Issues
Beta Was this translation helpful? Give feedback.
All reactions