interfasys
Verified User
User files have the following permissions:
user:user
PHP-FPM is configured with the following permissions:
user:user
Typical apps, including the ones installed by CB in /var/www/html have the following permissions:
File 644
Folder 755
That gives the right to PHP to do anything it wants in the folders allowed in open_basedir.
So any attacker who can gain write access through one of the PHP files will be able to wipe the site/app/database, make evil modifications, etc.
Sure, the threat is contained, but it's not very reassuring to the user or the server admin.
What can CB do to fix this? There is only one solution:
Introduce php-<user> groups, one for each user
Things that won't fix anything
What are your thoughts on this subject?
user:user
PHP-FPM is configured with the following permissions:
user:user
Typical apps, including the ones installed by CB in /var/www/html have the following permissions:
File 644
Folder 755
That gives the right to PHP to do anything it wants in the folders allowed in open_basedir.
So any attacker who can gain write access through one of the PHP files will be able to wipe the site/app/database, make evil modifications, etc.
Sure, the threat is contained, but it's not very reassuring to the user or the server admin.
What can CB do to fix this? There is only one solution:
Introduce php-<user> groups, one for each user
Things that won't fix anything
- Using apache as the group in pools
- Changing permissions
What are your thoughts on this subject?
Last edited: