Symlink Protection for cPanel

Symlink Protection for cPanel is much important . Symlink  attack occurs after the attacker has been able to read the contents of the /etc/passwd file and has enumerated the server’s users.

Symlink race condition vulnerability

If you enable both of the SymLinksIfOwnerMatch and FollowSymLinks configuration settings, Apache becomes vulnerable to a race condition through symlinks. This symlink vulnerability allows a malicious user to serve files from anywhere on a server that strict OS-level permissions do not protect.

Filesystem-level solutions :   Enable mod_ruid + jailshell for your apache webserver.

To enable this option, recompile Apache and then enable EXPERIMENTAL: Jailshell Virtual Hosts using mod_ruid2 and cPanel jailshell in WHM’s Tweak Settings interface (Home >> Server Configuration >> Tweak Settings).

Using cageFS

CageFS is a virtualized file system and a set of tools to contain each user in its own ‘cage’. This option is available on all cPanel-supported platforms today, and it is already included with CloudLinux.

(more…)

Continue ReadingSymlink Protection for cPanel

How To Protect Your Linux Server from the GHOST Vulnerability

GHOST vulnerability affecting Linux systems was discovered in the C library of GNU / Linux (glibc) that gives control to attackers without requiring system credentials.

ghost-linux-security-vulnerability-e1422467010987.png.pagespeed.ce.SiGafGqc3D

GHOST creates a buffer overflow that affects all the gethostbyname*() functions in the glibc library. These functions change a hostname into an IP addresses. A hacker exploiting this can gain complete access of the Linux machine.

(more…)

Continue ReadingHow To Protect Your Linux Server from the GHOST Vulnerability

How To Detect And Clean Crypto PHP Malware

CryptoPHP is a threat that uses backdoored Joomla, WordPress and Drupal themes and plug-ins to compromise webservers on a large scale. By publishing pirated themes and plug-ins free for anyone to use instead of having to pay for them, the CryptoPHP actor is social engineering site administrators into installing the included backdoor on their server.

After being installed on a webserver the backdoor has several options of being controlled which include
command and control server communication, mail communication as well as manual control.
cryptophp-whitepaper-foxsrtPicture : foxitsecurity.files.wordpress.com

How To Detect And Clean CryptoPHP Malware?
(more…)

Continue ReadingHow To Detect And Clean Crypto PHP Malware