Is there a security vulnerability with Mautic? The local PHP file contains both my username and password and is located in a public HTML folder. You can find the Mautic root path here: app/config/local.php.
If so, what security procedures do you recommend, such as 2FA, plugin, etc.?"
You need to store it somewhere.
And that is not your username, but DB, and SMTP credentials.
The .htaccess file should make sure the unwanted files are not accessable.
To add Firebase Authentication OAuth 2.0 credential to Mautic 4.0, you can follow these steps:
Log in to your Firebase account and go to the “Project settings” page for your project with ID “gmail-mail-xxxx”.
Click on the “Service accounts” tab and then click on the “Generate new private key” button to download a JSON file containing your private key.
Copy the contents of the JSON file to your clipboard.
SSH into your Mautic server and navigate to the app/config directory.
Create a new file called firebase_credentials.json in the app/config directory and paste the contents of the JSON file into the new file.
In the Mautic dashboard, go to the “Plugins” section and click on the “Social” tab.
Click on the “Add new” button and select “Google” as the provider.
Enter a name for the provider and select “OAuth 2.0” as the authentication type.
In the “Client ID” field, enter the value of the “client_id” field from the JSON file.
In the “Client secret” field, enter the value of the “private_key” field from the JSON file.
In the “Scopes” field, enter “email” and “profile”.
Click on the “Save & Close” button to save the provider.
Once you have completed these steps, you should be able to use Firebase Authentication OAuth 2.0 to authenticate users in Mautic 4.0.
@team this is getting confusing. As @joeyk pointed out, the password in app/config/local.php file is not your user password but a database password.
It’s safer to store it in a PHP file than any .env, yaml, json or other text format because if you run Mautic, the idea is that PHP files are executables and if someone access the file then it will execute rather than print out its content.
And as pointed out already, there is .htaccess that will secure it for Apache.
Then you are suggesting Firebase authentication. That is for user authentication, not database authentication.
Users have passwords stored in the database. The password is encrypted by standard algorithms, using salt and all that. They are as secure as they can be. If you want to use another provider for authentication then go ahead, but I fear that you will be confusing others when you discuss it on a forum topic called “Security vulnerability”. It’s unrelated.