The tricky security issue with FollowSymLinks and Apache

Hanno's Blog

Tuesday, June 23. 2015

The tricky security issue with FollowSymLinks and Apache


Trackbacks

htpasswDoS: Local Denial of Service via Apache httpd password hashes
The way the Apache httpd web server handles password hashes can be abused by a malicious user on a server to cause resource exhaustion and denial of service of the web server. I reported this a while ago to the Apache security team - which led to a length
Weblog: The Fuzzing Project
Tracked: Jan 10, 13:17

Comments
Display comments as (Linear | Threaded)

Even now 14 Sept 2017 we still have this issue!

Using Centos 7, EA4, suphp there is no viable option to protect against symlink vulnerability. The cpanel hardened patch and GR patch are both still for Centos 6
#1 simon on 2017-09-14 18:53 (Reply)

Add Comment

E-Mail addresses will not be displayed and will only be used for E-Mail notifications.

To prevent automated Bots from commentspamming, please enter the string you see in the image below in the appropriate input box. Your comment will only be submitted if the strings match. Please ensure that your browser supports and accepts cookies, or your comment cannot be verified correctly.
CAPTCHA

 
 

About

This blog is written by Hanno Böck. Unless noted otherwise, its content is licensed as CC0.

You can find my web page with links to my work as a journalist here.

I am also publishing a newsletter about climate change and decarbonization technologies.

The blog uses the free software Serendipity and is hosted at schokokeks.org.

Hanno on Mastodon | Contact / Imprint | Privacy / Datenschutz