didn't you secure /tmp?
/usr/bin/perl /var/tmp/cb.txt
I understand what you are saying, but my opinion is that the DirectAdmin is a product, and the integrator which have the responsibility to check what's there and what's unsecure is the server administrator, not DA developers.[...] DirectAdmin is an "integrator" of sorts. DirectAdmin could basically absolve itself of dealing with these kinds of responsibility issues if it forced a user to choose to install an app like Roundcube at install time rather than have the user have go clean up unwanted things afterwards.
This is perfectly right: any software should have a "minimal" version for high security purposes or a list of base feature options when installing, or at the very least a dedicated list of features that can be removed afterwards.Just like every other component of security that people have mentioned in this thread, being proactive at not installing things that you are not using is another way to increase security. In this scenario, anyone who had chosen to not install Roundcube would not have been vulnerable to this particular exploit period.
I understand what you are saying, but my opinion is that the DirectAdmin is a product, and the integrator which have the responsibility to check what's there and what's unsecure is the server administrator, not DA developers.
You can choose not to install Roundcube on the installation time if you want. When it asks you if you want to use the defaults, answer "no".
Not to flog a dead horse or anything but my logs are showing lots of active scans for roundcube vulnerabilities this morning, you should probably check yours too.
http://isc.sans.org/diary.html?storyid=5659
Just to add a little (off) color, two of the culprits start their probes with GET /nonexisten****, and GET /thisdoesnotexistahaha.php which are old and tired. Looks like some botnet trying to learn new tricks. Too lazy to count the number of IP's involved, maybe 2 dozen....
On our newer servers, running Apache 2.x and PHP 5, our servers return no server signature at all.Apache/1.3.41 Server at www.example.com Port 80
Our apache did return the full string by default, disabled it now though.
floyd, you are completely missing my point.I find it unlikely that people would have chosen "No" to roundcube before knowing about the vulnerability.
Right after running the DirectAdmin install anybody could have easily removed it with a simple "rm -rf /var/www/html/roundcube*" but yet nobody did. Why? Because we all thought it was safe to run.
Its easy to say in hind sight "I never would have installed it." But in reality most people would have installed it. And the ones here wanting to have the choice, you had the choice to take 10 seconds out of your day to remove it, but you didn't. And you have the choice to remove anything that DA installs by default.
but that is not the point of this discussion
it would be extremely easy to have the script just not install what you don't want period
but when there is a custom installer that walks you through applications with a YES/NO choice
My point is that most would have installed roundcube anyway and therefore been susceptible.
Way to toot your own horn. I certainly have benefited from the info you have posted but actually I did not "discover" this vulnerability because you posted something about it. I found out about it similar to how you did because of noticing the issue on one of my servers.The point of the discussion which I started is there was a roundcube vulnerability. BTW you're welcome.
As smtalk and I have already pointed out, there essentially IS already a clear option to install/not install it, but it is not functioning as how one would expect it to. That, again, is the point I was making.If you would like to have a clear option to install or not to install then put it in the feature request.
I can fix a bug or change something in the script myself, but I'm trying to help make it more useful for everyone, not just myself. And I also don't want to have to maintain a special install script just for me.The script is open source. Feel free to change it anyway you like.
Cool, that's great. That's why there is already an option for you to choose whether you want to use defaults or not. If you choose not to use defaults then obviously you have to answer some questions. If you want to install everything and then clean up unwanted stuff on your own, that's your prerogative. That doesn't mean everyone should have to do it that way.I am glad I don't have to sit there and answer a bunch of question to install DA. I run one command and let it go. I can then remove what I don't want after its done what it does. Its a lot faster that way.
dlong500 said:Way to toot your own horn.
dlong500 said:That's why there is already an option for you to choose whether you want to use defaults or not.
dlong500 said:And I also don't want to have to maintain a special install script just for me.
I don't answer any questions or edit any configuration files. I download the setup script and then I run one command to start the install as soon as its downloaded.
sh setup.sh UID LID hostname eth0
All I was saying is make it so that when you DO choose to edit the options.conf file or decide to use the question/answer mode that choosing "NO" to Roundcube will not install it.
floyd, you are completely missing my point.
I find it unlikely that people would have chosen "No" to roundcube before knowing about the vulnerability.