Am 17.08.2011 13:14, schrieb Pierre Joye:
> On Tue, Aug 16, 2011 at 11:29 PM, Reindl Harald <h.rei...@thelounge.net> 
> wrote:
>> Hi
>>
>> https://bugs.php.net/bug.php?id=52312
>>
>> does the security-problem in combination with open_basedir only
>> occur if there are symlinks created?
>>
>> * i guess in most secure setups "symlink" is disabled
> 
> For what I can see, almost no setup disables the symlink functions in
> php, even less in the shell.

defaults on all servers i maintain since 10 years
"popen" is disabled per vhost with "php_admin_value 
suhosin.executor.func.blacklist"
since "disable_functions" is to dumb working on <Diretory>-directive

disable_functions = "exec, passthru, shell_exec, system, proc_open, proc_close, 
proc_nice, proc_terminate,
proc_get_status, pcntl_exec, apache_child_terminate, posix_kill, posix_mkfifo, 
posix_setpgid, posix_setsid,
posix_setuid, mail, symlink"

>> * give us a option to bypass the check in such environments
> 
> Well, there are other better ways to control access than relying on
> open_basedir. Permissions are on, that's why I would not add special
> cases here

if you are hosting some hundret domains there are not really
better ways since you will not add hundrets of system-users
while you have to deal with FTP/SFTP

and exactly these setups for some hundret domains would benefit
most of the realpath-cache


Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to