X-Git-Url: http://www.aleph1.co.uk/gitweb/?a=blobdiff_plain;f=web%2Fmodules%2Fcontrib%2Fsecurity_review%2Fsrc%2FChecks%2FFilePermissions.php;h=17972b22bef43d90e31ed3d0d40798ac7f6caea3;hb=5ca1b61ad2659177690cbde2cf7675f9c0d50491;hp=8641747223fbfdd4d0defb6278285cb117c829b4;hpb=ba1b5c55c66590c41ccc9844d3e62391b0399abb;p=yaffs-website diff --git a/web/modules/contrib/security_review/src/Checks/FilePermissions.php b/web/modules/contrib/security_review/src/Checks/FilePermissions.php index 864174722..17972b22b 100644 --- a/web/modules/contrib/security_review/src/Checks/FilePermissions.php +++ b/web/modules/contrib/security_review/src/Checks/FilePermissions.php @@ -1,12 +1,8 @@ t('It is dangerous to allow the web server to write to files inside the document root of your server. Doing so could allow Drupal to write files that could then be executed. An attacker might use such a vulnerability to take control of your site. An exception is the Drupal files, private files, and temporary directories which Drupal needs permission to write to in order to provide features like file attachments.'); $paragraphs[] = $this->t('In addition to inspecting existing directories, this test attempts to create and write to your file system. Look in your security_review module directory on the server for files named file_write_test.YYYYMMDDHHMMSS and for a file called IGNOREME.txt which gets a timestamp appended to it if it is writeable.'); - $paragraphs[] = $this->l( + $paragraphs[] = new Link( $this->t('Read more about file system permissions in the handbooks.'), Url::fromUri('http://drupal.org/node/244924') );