Dear Wiki user,

You have subscribed to a wiki page or wiki category on "Httpd Wiki" for change 
notification.

The "FileSystemSecurity" page has been changed by ChrisPepper.
http://wiki.apache.org/httpd/FileSystemSecurity?action=diff&rev1=5&rev2=6

--------------------------------------------------

  
  Making directories writable by the web server should be done only with care 
and consideration.  The typical attack model is: someone manages to upload (for 
instance) a PHP script of their own making into the document root, and simply 
executes that by accessing it through a browser.  Now your machine is executing 
their code under their control.
  
- If a web app needs writable directories, it's often better to have those 
outside the Document Root 
([[http://httpd.apache.org/docs/2.2/mod/core.html#documentroot]]): that way the 
uploads can't be accessed from the outside through a direct URL.  Some 
applications (Wordpress ([[http://wordpress.org/]]) for instance) support this, 
others do not.  
+ If a web app needs writable directories, it's often better to have those 
outside the Document Root 
([[http://httpd.apache.org/docs/2.2/mod/core.html#documentroot]]): that way the 
uploads can't be accessed from the outside through a direct URL.  Some 
applications, such as WordPress [[http://wordpress.org/]] support this; others 
do not.  
  
- In many cases, writable directories are not strictly necessary even though 
the web app might like them: rather than upload plugins (which contain code 
that gets executed or interpreted, yech!) through the web browser, upload them 
through ssh and manually unpack them on the server.  The CMS Joomla! likes to 
write its configuration file to the Document Root on initial install (which 
promptly becomes a popular attack target) but if it can't write to the Document 
Root, it will output the config to the browser to the user can manually upload 
it.
+ In many cases, writable directories are not strictly necessary even though 
the web app might like them: rather than upload plugins (which contain code 
that gets executed or interpreted, yech!) through the web browser, upload them 
through ssh and manually unpack them on the server.  The Joomla! CMS, for 
instance, attempts to write its configuration file to the Document Root during 
installation -- this is therefore a popular target -- but if it can't write to 
the Document Root, it will output the config to the browser to the user can 
manually upload it.
  
- (Credits to Sander Temme for elaborating on this subject in a much more 
concise fashion than I could have achieved)
+ (Credit to Sander Temme for elaborating on this subject in a much more 
concise fashion than I could have achieved)
  

Reply via email to