that depends from you which patch to use
how can we monitor our servers that patches are working properly.
how can we monitor our servers that patches are working properly.
It doesn't really matter; the nice thing about rack911's is that it's a one-line install (well, actually 4 lines, but one copy and paste into your shell).So which patch we should use yours or Mitio
Create a symlink pointing to the root filesystem or to another user and see if it works or gives an error.that depends from you which patch to use
how can we monitor our servers that patches are working properly.
Interesting.I hate cpanels stance on this so we have created a patch and have been using for some time. It turns FollowSymLinks into SymLinksIfOwnerMatch at the apache source code level.
When I insisted and mentioned again this thread, then I received this reply:Your server Apache service is already built with latest stable release and it is free from those vulnerabilities. You can ignore it now.
When I insisted again, telling them that this patch provided by StevenC is just a couple of weeks old, they said they would contact cPanel Support. And the reply they quote from cPanel Support is this one:Yeah I am sure, cPanel forum thread you mentioned is very old one and team has already patched services for all vulnerabilities reported.
I'd appreciate your comments on this, specially from StevenC.The patch in that forum post is not not developed nor supported by us.
You have "SymLinksIfOwnerMatch" checked in WHM -> Service Configuration -> Apache COnfiguration, so symlinks will only be followed if the owners match.
Interesting.
I have contacted one of my VPS providers upon this issue, which by the way is supossed to be *managed* and their first reply was, and I quote:
When I insisted and mentioned again this thread, then I received this reply:
When I insisted again, telling them that this patch provided by StevenC is just a couple of weeks old, they said they would contact cPanel Support. And the reply they quote from cPanel Support is this one:
I'd appreciate your comments on this, specially from StevenC.
Thanks!
I thought one or the other could be applied. You mean both patches should be applied?The patch that I created along with the patch that Mitio created resolves this exploit without having to deal with htaccess files. It drops in and forces FollowSymLinks to act like SymLinksIfOwnerMatch.
Opps!Thanks StevenC, I appreciate your reply.
I thought one or the other could be applied. You mean both patches should be applied?
One way or another, it's very easy to discover other users on the system, whether via running processes, ps, or guessing. The real issue is preventing them getting into those users' accounts, and that's what we've been discussing here.cPanel makes it very easy for the attacker. At first I wondered how they could come up with the random names under /home since /home is not readable (go+x only), but apparently if the server is running cPanel, the attacker accesses various world-readable files like /etc/trueuserowners which have the whole list of unix names of the system, so they can easily iterate them under /home.
Bad cPanel... !
cPanel isn't necessary to obtain a list of usernames from a server. Using Linux as an example, /etc/passwd* or /etc/group* can be used instead. Additionally, they contain more information than /etc/trueuserowners.cPanel makes it very easy for the attacker. At first I wondered how they could come up with the random names under /home since /home is not readable (go+x only), but apparently if the server is running cPanel, the attacker accesses various world-readable files like /etc/trueuserowners which have the whole list of unix names of the system, so they can easily iterate them under /home.
Bad cPanel... !
Absolutely you need to ensure that the site applications like WordPress/Joomla are secured as that is the most likely point of entry. This symlink vulnerability is abused once access has been obtained so you must focus on the was access is obtained as well.hi,
thanks , i am looking in to this, in the mean time , if we are securing the website depends upon what CMS we are using like we said joomla and wordpress will also prevent this hacking ? . Like implement the encryption methods and deny the admin access to particular users only etc ...
Thread starter | Similar threads | Forum | Replies | Date |
---|---|---|---|---|
K | Security Policy Handling Failed | Security | 4 | |
![]() |
Solutions for handling ddos attacks? | Security | 3 | |
P | Security Handling [improving the error message is CPANEL-5713] | Security | 2 | |
H | Not find any solutions after my port 2086/2087 Blocked :'( | Security | 1 | |
O | What anti-virus solutions? | Security | 93 |