Hello
Hope you all are busy in a good way.
I've run into few things when securing php (we are using PHP in CGI mode w/ suPHP & open_basedir enabled), my main concerns are
1) even open_basedir is enabled, users are able to look other files using for example phpshell, they can see /etc/passwd and when they put username/domain together, they could see users homepage files
2) how to stop users executing/compiling binaries (for example DDOS programs) via exec, system... /tmp is no_exec, but when user uploads such tools to their home dir, they could execute this?
Thank you for suggestions and pointouts.
Regards,
HKI
Hope you all are busy in a good way.
I've run into few things when securing php (we are using PHP in CGI mode w/ suPHP & open_basedir enabled), my main concerns are
1) even open_basedir is enabled, users are able to look other files using for example phpshell, they can see /etc/passwd and when they put username/domain together, they could see users homepage files
2) how to stop users executing/compiling binaries (for example DDOS programs) via exec, system... /tmp is no_exec, but when user uploads such tools to their home dir, they could execute this?
Thank you for suggestions and pointouts.
Regards,
HKI