Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 18 Jan 2001 11:21:15 -0800 (PST)
From:      Gordon Tetlow <gordont@bluemtn.net>
To:        "Michael R. Wayne" <wayne@staff.msen.com>
Cc:        <hackers@FreeBSD.ORG>
Subject:   Re: Protections on inetd (and /sbin/* /usr/sbin/* in general)
Message-ID:  <Pine.BSF.4.31.0101181119530.27604-100000@sdmail0.sd.bmarts.com>
In-Reply-To: <200101170335.WAA18537@manor.msen.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, 16 Jan 2001, Michael R. Wayne wrote:

> Background:
>    We recently had a customer's web site suffer an attempted exploit
>    via one of their cgi scripts.  The attempted exploit involved
>    writing a file into /tmp, then invoking inetd with that file to
>    get a root shell on a non-standard port.  While the exploit
>    failed, they were able to write the file as user nobody and
>    invoke inetd.  There is not much we can do about that as long
>    as we permit customers to use their own cgi scripts, which is
>    a requirement with this type of account.

If you are using apache (who isn't?), I highly suggest you look into using
suexec. That way bad CGI programming is offloaded to the customer and not
to your system.

-gordon



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.31.0101181119530.27604-100000>