Vendor directory security check: Difference between revisions

From MoodleDocs
(Initial version of the page, with the info simply copied from Moodle)
 
m (update link to Spanish page)
 
(4 intermediate revisions by 3 users not shown)
Line 1: Line 1:
== Vendor directory security check ==
{{Security overview report}}


'''The vendor directory should not be present on public sites.'''
'''The vendor directory should not be present on public sites.'''


The vendor directory inside the Moodle dirroot contains various third-party libraries and their dependencies, typically installed by the PHP Composer. It may be needed for local development, such as for installing the PHPUnit framework. But it can also contain potentially dangerous code exposing your site to remote attacks.
The directory <tt>vendor</tt> inside the Moodle dirroot contains various third-party libraries and their dependencies, typically installed by the PHP Composer. It may be needed for local development, such as for installing the PHPUnit framework. But it can also contain potentially dangerous code exposing your site to remote attacks.


It is strongly recommended to remove the directory if the site is available via a public URL, or at least prohibit web access to it.
It is strongly recommended to remove the directory if the site is available via a public URL, or at least prohibit web access to it.
[[es:Comprobación de seguridad del directorio de proveedores]]

Latest revision as of 17:22, 19 October 2023

The vendor directory should not be present on public sites.

The directory vendor inside the Moodle dirroot contains various third-party libraries and their dependencies, typically installed by the PHP Composer. It may be needed for local development, such as for installing the PHPUnit framework. But it can also contain potentially dangerous code exposing your site to remote attacks.

It is strongly recommended to remove the directory if the site is available via a public URL, or at least prohibit web access to it.