Gordon Burditt [mailto:[EMAIL PROTECTED]] wrote:
> 
> There's a problem here:  you need to have whatever 
> information is needed to access MySQL (or any other database) 
> in those files. If someone else on the same machine can get 
> that information, he can also access the database.  It 
> doesn't matter if this information is encrypted for 
> transmission - every client knows how to do that.
[clip]

Thanks for the detailed explanation of where the holes lie and why mySQL
can't see anything other than what the client provides. I understand now
where the holes are, but it would certainly be a project worth tackling
if the result were a secure database connection from what is inherently
an insecure shared server environment.

As I continue to look around, the results are truly frightening.  I've
let dozens of people on two servers I use know that I can read their
config files. This, without more than 20 minutes of playing with a PHP
script. I know these people, and asked them before I probed their
directories. One of the servers has a significant number of shopping
cart accounts on it - the specialty of the hosting vendor. In this
particular shopping cart application, many orders in the database store
a plain text credit card number until the order is picked up by the
merchant.

I think I'll write an article detailing the problem. I won't pick on
mySQL - it's certainly not a problem only with mySQL, but with any
information stored in configuration files. More people should understand
the risks here - certainly more people should pressure their hosting
companies for more secure configurations.

-t


---------------------------------------------------------------------
Before posting, please check:
   http://www.mysql.com/manual.php   (the manual)
   http://lists.mysql.com/           (the list archive)

To request this thread, e-mail <[EMAIL PROTECTED]>
To unsubscribe, e-mail <[EMAIL PROTECTED]>
Trouble unsubscribing? Try: http://lists.mysql.com/php/unsubscribe.php

Reply via email to