Paul Muloin
New Pleskian
Using plesk 12 installed fresh from the official plesk ubuntu 14.04 iso. latest uppdates
last week we had a mass defacement of websites via a symlink attack thru a compromised vhost.
Looks like they gained access to their user and then wrote data to all folders it could find in that group (which was everyone).
here is the kicker, all http docs folders belong to group psaserv. This default plesk behavior is what got us into trouble, allowing a comprimised user in that group to symlink everywhere. Also, by default apache follow symlinks was on. unsure if turning symlinks off is wise in the plesk environment if you want things to work properly.
Most other panels, from what ive read, don't clump all vhost users into the same group and wont have this issue.
Im guessing if we went around and changed group ownership to be unique per vhost, then plesk will fail to do things like backup and stuff.
Is there a way to prevent this kind of attack without breaking plesk?
last week we had a mass defacement of websites via a symlink attack thru a compromised vhost.
Looks like they gained access to their user and then wrote data to all folders it could find in that group (which was everyone).
here is the kicker, all http docs folders belong to group psaserv. This default plesk behavior is what got us into trouble, allowing a comprimised user in that group to symlink everywhere. Also, by default apache follow symlinks was on. unsure if turning symlinks off is wise in the plesk environment if you want things to work properly.
Most other panels, from what ive read, don't clump all vhost users into the same group and wont have this issue.
Im guessing if we went around and changed group ownership to be unique per vhost, then plesk will fail to do things like backup and stuff.
Is there a way to prevent this kind of attack without breaking plesk?