Impact
A chained attack can enable otherwise-blocked PHP code from the main/install/ directory and allow an unauthenticated attacker to modify existing files or create new files where allowed by system permissions.
This only affects portals with the main/install/ directory still present and read-accessible.
Patches
Update to v1.11.38, apply d3355d7 or delete main/install/ (not required for working systems)
Workarounds
Delete main/install/
Restoration
If you have been affected by this vulnerability and your portal has been cracked, look for changes (update date) to app/config/configuration.php and for changes inside the file. In particular, function calls that write files like file_put_contents(), changes in the database host and credentials, or changes to $_configuration['security_key'].
Impact
A chained attack can enable otherwise-blocked PHP code from the main/install/ directory and allow an unauthenticated attacker to modify existing files or create new files where allowed by system permissions.
This only affects portals with the main/install/ directory still present and read-accessible.
Patches
Update to v1.11.38, apply d3355d7 or delete main/install/ (not required for working systems)
Workarounds
Delete main/install/
Restoration
If you have been affected by this vulnerability and your portal has been cracked, look for changes (update date) to app/config/configuration.php and for changes inside the file. In particular, function calls that write files like file_put_contents(), changes in the database host and credentials, or changes to $_configuration['security_key'].