joe@darkside:/home/zorm/public_html$ ls
__ZORMS_FILES_HERE__
I really don't think thats supposed to be allowed.
The problem here is I can open his config.php file and get his database file. I'm too mature to use it (er, ok, I don't know how to use it), but in the wrong hands, this is bad.
chmod 706 ?
That's it in the httpd.conf file.
iago, get to work. I'll do it if you want.
That's not a vuln, it's because the public_html has world-read permissions (0755). There are 3 options to fix that:
1. Make the folder 0711. Executable but not readable.
1. Make public html owned by the group "nobody", and assign the permission 0750
2. Make Apache SEXEC (I think), so that Zorm's stuff runs as the user Zorm, and make the permission 0700. But that opens a whole new barrel of monkeys.
Also, that's not "SSH" at all, even if it was a vuln it would be a permissions vuln. SSH is the means to get a remote connection and has nothing to do with what happens once you're there.
Either way, I can get his PHP source code. =p
And if I get complaints about how you act on my server, I'll cut off your access.
Quote from: iago on August 21, 2005, 01:15:04 PM
And if I get complaints about how you act on my server, I'll cut off your access.
*coughs* iago forgot AIM already?
Quote from: deadly7 on August 21, 2005, 07:31:39 PM
Quote from: iago on August 21, 2005, 01:15:04 PM
And if I get complaints about how you act on my server, I'll cut off your access.
*coughs* iago forgot AIM already?
That's not what I meant. He can store whatever he wants there, provided it's legal, information should be free. I meant abusing it.