W
whitecow
Guest
What if
User A has a php/mysql script which will include() a db.php containing connection details of the mysql server.
User B is able to browse User A's home directory and public_html, even having access to read db.php and aqquire the logon details.
Since apache ( afaik ) requires public execute permission on ~/ and ~/public_html/ plus public read permission on ALL accessable files how can one stop or limit this kind of abuse, and how do public access and shell providers deal with this problem, perhaps i should just ask them :/
The only thing i can think of is symlinking ~/public_html/ to /usr/local/www/XXXXX but as im not sure how symlink works i'd prefer not to do anything until im at least 40% sure
thanks in advance blah blah balh
isuck moos !
User A has a php/mysql script which will include() a db.php containing connection details of the mysql server.
User B is able to browse User A's home directory and public_html, even having access to read db.php and aqquire the logon details.
Since apache ( afaik ) requires public execute permission on ~/ and ~/public_html/ plus public read permission on ALL accessable files how can one stop or limit this kind of abuse, and how do public access and shell providers deal with this problem, perhaps i should just ask them :/
The only thing i can think of is symlinking ~/public_html/ to /usr/local/www/XXXXX but as im not sure how symlink works i'd prefer not to do anything until im at least 40% sure
thanks in advance blah blah balh
isuck moos !