We are already using CageFS and yes this can help you to overcome on this issue.What about Cloud Linux's Cagefs? Would that work?
We are already using CageFS and yes this can help you to overcome on this issue.What about Cloud Linux's Cagefs? Would that work?
and there are some 3rd party patches provided in this thread that you may be interested in as well.CloudLinux provides a better solution for the problem, that makes sure that any static file served by Apache for the VirtualHost will be owned by same user as specified in SuexecUserGroup directive for that VirtualHost.
This completely prevents the potential for such attacks. The solution doesn't suffer from race conditions. It is very efficient, with much lower overhead then SymLinksIfOwnerMatch.
Why don't you just move this thread to feature requests....I don't disagree. If there were a 12 page thread in the Feature Requests for cPanel & WHM for this, then there may be a better chance of seeing a patch implemented from cPanel. I urge one of you to create a thread there, and email/tweet/facebook/text/whatever the link to everyone you know, asking them to reply to it with their support.
Hi Michael, I've asked the cPanel Product Manager @cPanelKenneth about this. His comments mirror cPanelJeff's, above. "This is an Operating System vendor issue. Patching Apache is only a partial solution and the patches available are still subject to race conditions. cPanel is not an Operating System vendor, does not touch the kernel, nor most tools on the system. Taking this to the Vendor is the way to go and/or using something like GRSecurity to solve the problem."Why don't you just move this thread to feature requests....
Cpanel seem to use the excuse that users didn't jump through hoops 1-20 and that's why nothing is being done. Sorry doesn't make sense - if you value your software surely a cpanel staff member would bring issues to the attention of cpanel devs....?
I don't follow the 99% safety. 99% safety is not safety if the hackers are aware to exploit the 1% unsafe scenarios, right? Then again, I suppose there really is no such thing as 100% safetyStevens patch + good disable_functions in php.ini + disable cgi server wide + disable zip unpacking by users + permanent cron control = 99% safety....
That is why I post: 99% not 100.... there is no 100% security.Then again, I suppose there really is no such thing as 100% safety![]()
<Directory "/home">
Options +All -ExecCGI -FollowSymLinks +Includes +IncludesNOEXEC -Indexes -MultiViews +SymLinksIfOwnerMatch
AllowOverride All Options=ExecCGI,Includes,IncludesNOEXEC,Indexes,MultiViews,SymLinksIfOwnerMatch
</Directory>
find /home -iname ".htaccess" -exec grep -l "FollowSymLinks" {} \;
Shocked that an advisory e-mail hasn't been sent out to cPanel users with discussion of this issue and potential solutions.
In my case, I implemented this change:
to my /usr/local/apache/conf/includes/pre_virtualhost_global.confCode:<Directory "/home"> Options +All -ExecCGI -FollowSymLinks +Includes +IncludesNOEXEC -Indexes -MultiViews +SymLinksIfOwnerMatch AllowOverride All Options=ExecCGI,Includes,IncludesNOEXEC,Indexes,MultiViews,SymLinksIfOwnerMatch </Directory>
and then did this to find all the .htaccess files on my server that contain +FollowSymLinks:
and systematically went through all of them and changed +FollowSymLinks to +SymLinksIfOwnerMatch.Code:find /home -iname ".htaccess" -exec grep -l "FollowSymLinks" {} \;
All in all about 5 minutes work.