I just started getting a couple weeks ago this warning without making any changes to my config.
Very few of the dozen or so accounts even have SSH access enabled. But one of them I SSH'd into. I could change to the home directory of one of the other accounts but can't view anything, says 'Permission Denied."
I verified all scripts in all accounts are running PHP as the account user and not the 'nobody' user as I saw mentioned on a webpage about this warning.
So what's the "real world" level of security risk I have leaving my config as-is? These are fairly obscure websites as opposed to well-known targets. There's not sensitive data like credit card social security numbers anywhere. And why did this only recently start to warn me?
"Apache vhosts are not segmented or chroot()ed. Enable “mod_ruid2” in the “EasyApache 4” area, enable “Jail Apache” in the “Tweak Settings” area, and change users to jailshell in the “Manage Shell Access” area. Consider a more robust solution by using “CageFS on CloudLinux”. Note that this may break the ability to access mailman via Apache." |
Very few of the dozen or so accounts even have SSH access enabled. But one of them I SSH'd into. I could change to the home directory of one of the other accounts but can't view anything, says 'Permission Denied."
I verified all scripts in all accounts are running PHP as the account user and not the 'nobody' user as I saw mentioned on a webpage about this warning.
So what's the "real world" level of security risk I have leaving my config as-is? These are fairly obscure websites as opposed to well-known targets. There's not sensitive data like credit card social security numbers anywhere. And why did this only recently start to warn me?
Last edited: