[Previous] [Next] [Index] [Thread]

Re: Unix links subverting Web security



	Use SymlinksIfOwnerMatch -- I don't know if CERN supports
that, but I think Apache and NCSA 1.4 do.

> 
> Hello all,
> 
>   forgive me if this is an 'FAQ' type of question.
> 
> Using the CERN/3.0 WebServer (I haven't tried it with NCSA yet), I noticed
> the following.
> 
> I logged in as myself (in normal user mode), changed to the 'USER_DIR' of my
> account and then did the following:
> 
>     ln -s /etc/passwd test.doc
> 
> I then called this file across the network from another machine (albeit
> within the .bris.ac.uk domain) using netscape and the simple user specific
> URL of '~ccsw/test.doc'.
> 
> What I got back was a nicely pre-formatted copy of my '/etc/passwd' file.
> 
> Now, some of our systems DON'T use shadow passwords (not my fault,
> honest!).. and that meant that not only did I get a list of all the
> usernames, but also the passwords associated with them.
> 
> Now, knowing of the strengths of Crack and such like, and the dumb things
> our local users do, this constitutes a potential security hole.
> 
> So, the question is:
> 
>   Is there a standard way of stopping this, by configuration or some other
> means at source, that is the WebServer itself? Or, do I have to ritually
> scan my filesystem for links to potentially dangerous systems files and
> delete them??
> 
> Steff
> 
> : University of Bristol                            Steff.Watkins@bris.ac.uk
> : URL: http://sw.cse.bris.ac.uk/  <= As mentioned in Wired 1.04+
> : Making a fire so big the gods will notice me again!!!
> 
> 


-- 
sameer						Voice:   510-601-9777
Community ConneXion				FAX:     510-601-9734
The Internet Privacy Provider			Dialin:  510-658-6376
http://www.c2.org (or login as "guest")			sameer@c2.org


References: