Nicolai Rosen on Mon, 8 May 2000 18:09:37 -0400 (EDT) |
On Mon, 8 May 2000 ziggy@panix.com wrote: > > > > >>>>> "SH" == Simply Hao <hao@netaxs.com> writes: > > >> apache.org was hacked; here's how. > > SH> So is that particular hole in Bugzilla fixed now? > > > > I believe it was a mysql ``feature''. > > > > Bugzilla came into play because the people who configured it (the > > apache.org install), improperly configured mysql for bugzilla, > > granting the bugzilla user permissions it didn't actually need. > > According to http://www.dataloss.net/papers/how.defaced.apache.org.txt, > the crack was enabled due to configuration errors *alone*. > > - apache was configured to have ftproot == wwwroot > - php3 was configured to execute passthrough commands > (could have been done with a simple untainted Perl script using `` or > system()) > - mysql was running as root (it shouldn't have been) > > Z. Although, I've gotta say that it's pretty moronic to make a program that stores the master password in plain text. Nicolai Rosen nick@netaxs.com Earthstation/Netaxs http://laktar.dyndns.org/ http://www.netaxs.com/~nick/ **Majordomo list services provided by PANIX <URL:http://www.panix.com>** **To Unsubscribe, send "unsubscribe phl" to majordomo@lists.pm.org**
|
|