Prevent Symlink Attack
Posted: Thu Dec 13, 2012 4:32 pm
Hi,
I have a webserver with Apache and since the apache doesn't actually handle the "Follow Symlink By Owner" i have a lot of symlink attack in my server and i cannot disable the "Follow Symlink" too because of the websites using it for SEO .
So i've heard that i could patch the kernel to prevent this kind of attack and i found out there is a feature in GrSecurity "Linking restrictions" that would prevent race exploits on /tmp and users will also not be able to hardlink to files they do not own, so i've created a test server in vmware and patched a kernel "2.6.32.60" with grsec but users could still create links of other user's files and read the content .
My question is that is it possible to prevent this kind of attack with grsec patch and if yes then how should i do it ? (what's the right way to do it?)
Regards...
I have a webserver with Apache and since the apache doesn't actually handle the "Follow Symlink By Owner" i have a lot of symlink attack in my server and i cannot disable the "Follow Symlink" too because of the websites using it for SEO .
So i've heard that i could patch the kernel to prevent this kind of attack and i found out there is a feature in GrSecurity "Linking restrictions" that would prevent race exploits on /tmp and users will also not be able to hardlink to files they do not own, so i've created a test server in vmware and patched a kernel "2.6.32.60" with grsec but users could still create links of other user's files and read the content .
My question is that is it possible to prevent this kind of attack with grsec patch and if yes then how should i do it ? (what's the right way to do it?)
Regards...