Mailing List ecs-isp@2rosenthals.com gearchiveerd bericht #362

Van: "Steven Levine" <ecs-isp@2rosenthals.com> Volledige berichtkoppen
Ongedecodeerd bericht
Onderwerp: Re: [eCS-ISP] Apache 2.4.49 zero day exploit...
Datum: Tue, 05 Oct 2021 23:34:13 -0800
Aan: "eCS ISP Mailing List" <ecs-isp@2rosenthals.com>

In <list-2633065@2rosenthals.com>, on 10/05/21
   at 10:08 PM, "Roderick Klein" <ecs-isp@2rosenthals.com> said:

Hi,

>It seems this Apache version has a zero day exploit.
>https://therecord.media/apache-fixes-actively-exploited-web-server-zero-day/

This is yet another example of how important it is to understand how to
properly configure httpd or any other server, for that matter.  As the CVE
explains, it takes two errors for the exploit to be effective.  First is
the code defect.  Second is a misconfigured server setup.  There's no
reason to not use "require all denied" except for directories that are
supposed to be accessible and even then the access should be carefully
controlled.

Many years ago, when I first took over support of the SCOUG sever, I
discovered that the previous webmaster managed to Options +ExecCGI every
directory on the system.  This made for interesting log entries along with
processes that seemed to run for no reason.  Fortunately, this was long
enough ago that there were far fewer script kiddies, so no one tried to
damage the system.

Steven

--
----------------------------------------------------------------------
"Steven Levine" <steve53@earthlink.net>  Warp/DIY/BlueLion etc.
www.scoug.com www.arcanoae.com www.warpcave.com
----------------------------------------------------------------------


Aanmelden: Feed, Samenvatting, Index.
Afmelden
Mail naar ListMaster