Care to cite references? Or to explain to me how one 'seals' a directory other than using file permissions? If Apache isn't running suexec, it certainly isn't running chrooted, and you'd have to have a separate apache parent per home dir.
While you may not be able to see the other user's files while you're logged in via FTP, they are certainly still there. FTPd's have historically had a lot more options to chroot post-connect. Apache doesn't.
Fangorn wrote:Suexec defined per virtualhost to UID/GID (you need a unique UID/GID per user obviously)
open_basedir restriction on Level 0 directory restricts PHP within the user's dir.
...
That's all you need to prevent user A to access user's B tree through CGI/PHP. the o+x on level -2 allows suexec to work but prevents all other access except to the webserver's user. No rights for others at level -1 prevents anybody else than the webserver to do anything.
Fangorn wrote:Since nobody is running anything as the webserver except PHP and since your open_basedir restricts access to anything outside the virtualhost tree there's no security loop.
MattM wrote:Negative, observe the source code for the addon unzipper uu uses:
- Code: Select all
if (extention != ".exe" && extention != ".com" && extention != ".jar" && extention != ".vbs" && extention != ".bat")
{
DebugLine("Writing File: " + directoryName+@""+fileName);
FileStream streamWriter = File.Create(directoryName+@""+fileName);
As you can see I have thought of this particular securety concern.
I'd even go so far as to think that ideally, uniadmin should
check for world-writable directories within its structure
and refuse to operate if there are any.
Users browsing this forum: No registered users and 0 guests