Hello
I got hacked many times by cgi-telnet which I was stoping it by mod_sec and httpd.conf folder options like this
unfortuonitly ,, now days apache do not accept "Options=IncludesNOEXEC,-Indexes,Includes,-MultiViews,SymLinksIfOwnerMatch,-FollowSymLinks"
and mod_sec rules are not charm enough as hacker can put any other name like xxxx.zy or uuuu.sym
so I noticed one common factors needed to run this cgi which is file perm 755
so how can I forbidden 755 files from being open directly
I got hacked many times by cgi-telnet which I was stoping it by mod_sec and httpd.conf folder options like this
Code:
<Directory "/">
Options +ExecCGI -FollowSymLinks -Includes +IncludesNOEXEC -Indexes -MultiViews +SymLinksIfOwnerMatch
AllowOverride All
</Directory>
<Directory "/usr/local/apache/htdocs">
Options -ExecCGI Includes -Indexes -FollowSymLinks +IncludesNOEXEC -MultiViews +SymLinksIfOwnerMatch
AllowOverride AuthConfig Indexes Limit FileInfo Options=IncludesNOEXEC,-Indexes,Includes,-MultiViews,SymLinksIfOwnerMatch,-FollowSymLinks
Order allow,deny
Allow from all
</Directory>
<Directory "/home">
Options -ExecCGI Includes -Indexes -FollowSymLinks +IncludesNOEXEC -MultiViews +SymLinksIfOwnerMatch
AllowOverride AuthConfig Indexes Limit FileInfo Options=IncludesNOEXEC,-Indexes,Includes,-MultiViews,SymLinksIfOwnerMatch,-FollowSymLinks
Order allow,deny
Allow from all
</Directory>
and mod_sec rules are not charm enough as hacker can put any other name like xxxx.zy or uuuu.sym
so I noticed one common factors needed to run this cgi which is file perm 755
so how can I forbidden 755 files from being open directly