Craig, you seem very knowledgable and I appreciate your help.  I
confused matters by mentioning the word "upload."  I'm actually not
using php to upload the files.  The user ftps the files to the server,
and the ownership permissions prevent php from manipulating the files.

I'm looking for a clear answer on whether giving php permission, or
setting the directory to nobody:nogroup, or whatever, poses a security
threat.

How can php be used to edit/delete files without opening a security
hole?

Bear with me, I think I"m getting clearer.

>>> "Craig Vincent" <[EMAIL PROTECTED]> 04/19/02 03:07PM >>>
> How?  Manually each time a file is uploaded?  Or with PHP somehow?
>
> I appreciate your response, but perhaps I'm not clear enough.
>
> Isn't it quite common to have php creating/editing/deleting files on
> the server?  How is this done in a secure manner?
>
> Could you explain further?

Well technically unless your admin is using the latest PHP updates,
the
server is already open to known exploits (albeit most are pretty
difficult
to recreate).  Your admin is probably panicing as many others did when
the
exploits were announced they were mentioned as problems in the file
upload
routines....however most people don't realize that these exploits were
usable whether file uploading was used or not.

In answer to your question the file upload system is fairly secure but
you
should never rely on it alone.  When it initially uploads the file, the
file
is stored as a temporary name (so there's no way to execute code with
a
screwy filename).  And although it shouldn't be an issue regardless, as
long
as you remove any fancy characters from the true filename before you
store
it in another area (anything not alphanumeric or a .) you should have
no
problems whatsoever.

However as was mentioned before, assuming someone did manage to use the
file
upload system ...the worst damage one could do to a system would be to
erase/modify files associated with the webserver username (or files
with
open permissions)...so really worse case scenario if your admin has
done his
job properly is one could manage to erase all the other php uploaded
files
if they found an exploit.

Sincerely,

Craig Vincent



-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php 


-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to