We attempted to add this patch via EasyApache and compile failed with mod_sec errors.
"Syntax error on line 306 of /usr/local/apache/conf/modsec/10_asl_rules.conf:
SecRule takes two or three arguments, rule target, operator and optional action list"
The rules were adjusted and the patch then applied sucessfuly.
Unfortunately my server Shared SSL certificate then stopped working (.css and .js files giving 404 errors when using shared ssl links like
https://sslcertsite.com/~accountname/index.php). Which caused havok with my webstore customers till discovered and rectified.
Patch was then removed, except we had even more problems with mod_sec. So removed mod_sec profile completely and were then able to uninstall the patch.
A disaster of a weekend.
Can somebody confirm this Symlink patch does/does not stop Shared SSL certificates from working?
And it would be very much appreciated if somebody would bullet point list all the necessary actions to perform on a CentOS cPanel server running suPHP to stop the symlink exploit as best as possible at the moment? We have already done the "config files to chmod 600 (and 400 sometimes)" and I am running cxswatch to help protect the server.
Cheers,
Pete