<Directory "/">
Options +ExecCGI +FollowSymLinks -Includes +IncludesNOEXEC +Indexes -MultiViews +SymLinksIfOwnerMatch
AllowOverride AuthConfig FileInfo Indexes Limit Options=Indexes,FollowSymLinks
</Directory>
[~/public_html]# ls -lsa
0 lrwxrwxrwx 1 super super 5 Feb 7 15:32 slink -> test2*
4 -rwxrwxrwx 1 root root 9 Feb 7 15:29 test2*
# cat .htaccess
Options +FollowSymLinks
[I]Result 1:Symbolic link not allowed or link target not accessible: /home/super/public_html/slink[/I]
# cat .htaccess
Options +FollowSymLinks -SymLinksIfOwnerMatch
[I]Result 2: /home/super/public_html/.htaccess: Option SymLinksIfOwnerMatch not allowed here[/I]
# cat .htaccess
#empty
[I]Result 3: Symbolic link not allowed or link target not accessible: /home/super/public_html/slink[/I]
[~/public_html]# ls -lsa
0 lrwxrwxrwx 1 super super 5 Feb 7 15:32 slink -> test2*
4 -rwxrwxrwx 1 root root 9 Feb 7 15:29 test2*
[~/public_html]# cat slink
password
[~/public_html]# whoami
super
*) core: check symlink ownership if both FollowSymlinks and
SymlinksIfOwnerMatch are set [Nick Kew]
*) core: fix origin checking in SymlinksIfOwnerMatch
PR 36783 [Robert L Mathews <rob-apache.org.bugs tigertech.net>]
Please clarify. Does this mean that we still need to use the StevenC patch, or no longer need to use the StevenC patch?This patch most likely won't fix the time of check, time of use race condition, which will produce the same affect as having having just FollowSymlinks enabled.
Infact you can do it by disabling symlinks in Apache completely.
This is great that Apache finally added the patch in after 3 years.
From the change log, it looks like the functionallity change Apache did, may help in a lot of ways. If you disallow your users from changing the options, then you probably don't need the patch any more. However its probably still a good idea to use.Please clarify. Does this mean that we still need to use the StevenC patch, or no longer need to use the StevenC patch?
Thank you for that information. Regarding the second vunerability that still exists, I understand why you don't want to disclose the details. However, can you tell us if the StevenC patch protects against that vunerability?From the change log, it looks like the functionallity change Apache did, may help in a lot of ways. If you disallow your users from changing the options, then you probably don't need the patch any more. However its probably still a good idea to use.
After this are you still vulnerable? Yes. You are vulnerable to a different type of symlink attack. I'd rather not post a proof of cencept here since it would put hosts at risk. Apache is aware of the issue, but its probably unlikely they will change the code any time soon.
Its a little harder to exploit, however still very easily done, and likely to be used in the future when hosts start patching/updating Apache.
That is what I've been trying to say. It doesn't protect you from the other vulnerability.Thank you for that information. Regarding the second vunerability that still exists, I understand why you don't want to disclose the details. However, can you tell us if the StevenC patch protects against that vunerability?
Actually, we are running 2.2.22 and the directives work, but as before, break Joomla or anyone else having +FollowSymlinks in their .htaccess.From the change log, it looks like the functionallity change Apache did, may help in a lot of ways. If you disallow your users from changing the options, then you probably don't need the patch any more. However its probably still a good idea to use.
After this are you still vulnerable? Yes. You are vulnerable to a different type of symlink attack. I'd rather not post a proof of cencept here since it would put hosts at risk. Apache is aware of the issue, but its probably unlikely they will change the code any time soon.
Its a little harder to exploit, however still very easily done, and likely to be used in the future when hosts start patching/updating Apache.