Date: Thu, 18 Jan 2001 11:21:15 -0800 (PST) From: Gordon Tetlow <gordont@bluemtn.net> To: "Michael R. Wayne" <wayne@staff.msen.com> Cc: <hackers@FreeBSD.ORG> Subject: Re: Protections on inetd (and /sbin/* /usr/sbin/* in general) Message-ID: <Pine.BSF.4.31.0101181119530.27604-100000@sdmail0.sd.bmarts.com> In-Reply-To: <200101170335.WAA18537@manor.msen.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, 16 Jan 2001, Michael R. Wayne wrote: > Background: > We recently had a customer's web site suffer an attempted exploit > via one of their cgi scripts. The attempted exploit involved > writing a file into /tmp, then invoking inetd with that file to > get a root shell on a non-standard port. While the exploit > failed, they were able to write the file as user nobody and > invoke inetd. There is not much we can do about that as long > as we permit customers to use their own cgi scripts, which is > a requirement with this type of account. If you are using apache (who isn't?), I highly suggest you look into using suexec. That way bad CGI programming is offloaded to the customer and not to your system. -gordon To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.31.0101181119530.27604-100000>