List ecs-isp@2rosenthals.com Arkiverade meddelande #363

Från: "Massimo S." <ecs-isp@2rosenthals.com> Meddelandehuvud
Oavkodat meddelande
Ämne: Re: [eCS-ISP] Apache 2.4.49 zero day exploit...
Datum: Wed, 6 Oct 2021 15:06:37 +0200
Till: eCS ISP Mailing List <ecs-isp@2rosenthals.com>



Il 06/10/2021 09:34, Steven Levine ha scritto:
In <list-2633065@2rosenthals.com>, on 10/05/21
    at 10:08 PM, "Roderick Klein" <ecs-isp@2rosenthals.com> said:

Hi,

It seems this Apache version has a zero day exploit.
https://therecord.media/apache-fixes-actively-exploited-web-server-zero-day/

This is yet another example of how important it is to understand how to
properly configure httpd or any other server, for that matter.  As the CVE
explains, it takes two errors for the exploit to be effective.  First is
the code defect.  Second is a misconfigured server setup.  There's no
reason to not use "require all denied" except for directories that are
supposed to be accessible and even then the access should be carefully
controlled.

Many years ago, when I first took over support of the SCOUG sever, I
discovered that the previous webmaster managed to Options +ExecCGI every
directory on the system.  This made for interesting log entries along with
processes that seemed to run for no reason.  Fortunately, this was long
enough ago that there were far fewer script kiddies, so no one tried to
damage the system.

Steven

hi all,

about me
i've CGI disabled since years ago

maybe are 10 years that i don't us CGI stuff

massimo

Prenumerera: Sändning, Uppsamling, Index.
Stoppa prenumeration
Meddelande till ListMaster