summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rwxr-xr-xchecksetup.pl37
-rw-r--r--docs/sgml/administration.sgml13
-rw-r--r--docs/xml/administration.xml13
3 files changed, 59 insertions, 4 deletions
diff --git a/checksetup.pl b/checksetup.pl
index 79e5b294b..4f59e92e6 100755
--- a/checksetup.pl
+++ b/checksetup.pl
@@ -350,9 +350,13 @@ LocalVar('webservergroup', '
# This is the group your web server runs on.
# If you have a windows box, ignore this setting.
# If you do not wish for checksetup to adjust the permissions of anything,
-# set this to "".
+# set this to "". If you do set this to "", then your Bugzilla installation
+# will be _VERY_ insecure, because some files will be world readable/writable,
+# and so anyone who can get local access to your machine can do whatever they
+# want. You should only have this set to "" if this is a testing installation
+# and you cannot set this up any other way. YOU HAVE BEEN WARNED.
# If you set this to anything besides "", you will need to run checksetup.pl
-# as root.
+# as root, or as a user who is a member of the specified group.
$webservergroup = "nobody";
');
@@ -525,8 +529,9 @@ my @my_priorities = @{*{$main::{'priorities'}}{ARRAY}};
my @my_platforms = @{*{$main::{'platforms'}}{ARRAY}};
my @my_opsys = @{*{$main::{'opsys'}}{ARRAY}};
-if ($my_webservergroup && ($< != 0)) { # zach: if not root, yell at them, bug 87398
- print <<EOF;
+if ($my_webservergroup) {
+ if ($< != 0) { # zach: if not root, yell at them, bug 87398
+ print <<EOF;
Warning: you have entered a value for the "webservergroup" parameter
in localconfig, but you are not running this script as root.
@@ -538,6 +543,30 @@ see below are caused by this.
EOF
}
+} else {
+ # Theres no webservergroup, this is very very very very bad.
+ # However, if we're being run on windows, then this option doesn't
+ # really make sense. Doesn't make it any more secure either, though,
+ # but don't print the message, since they can't do anything about it.
+ if ($^O !~ /MSWin32/i) {
+ print <<EOF;
+
+********************************************************************************
+WARNING! You have not entered a value for the "webservergroup" parameter
+in localconfig. This means that certain files and directories which need
+to be editable by both you and the webserver must be world writable, and
+other files (including the localconfig file which stores your databasa
+password) must be world readable. This means that _anyone_ who can obtain
+local access to this machine can do whatever they want to your Bugzilla
+installation, and is probably also able to run arbitary Perl as the user the
+webserver runs as.
+
+You really, really, really need to change this setting.
+********************************************************************************
+
+EOF
+ }
+}
###########################################################################
# Global Utility Library
diff --git a/docs/sgml/administration.sgml b/docs/sgml/administration.sgml
index 63a761095..8794a0e2c 100644
--- a/docs/sgml/administration.sgml
+++ b/docs/sgml/administration.sgml
@@ -1366,6 +1366,19 @@ Group3, since he isn't in Group4.
(e.g.: <ulink url="http://bugzilla.mozilla.org/localconfig"> http://bugzilla.mozilla.org/localconfig</ulink>). If you can read the contents of this file, your web server has not secured your bugzilla directory properly and you must fix this problem before deploying Bugzilla. If, however, it gives you a "Forbidden" error, then it probably respects the .htaccess conventions and you are good to go.
</para>
</note>
+ <para>
+ When you run checksetup.pl, the script will attempt to modify various
+ permissions on files which Bugzilla uses. If you do not have a
+ webservergroup set in the localconfig file, then Bugzilla will have to
+ make certain files world readable and/or writable. <emphasis>THIS IS
+ INSECURE!</emphasis>. This means that anyone who can get access to
+ your system can do whatever they want to your Bugzilla installation.
+ <note>
+ This also means that if your webserver runs all cgi scripts as the
+ same user/group, anyone on the system who can run cgi scripts will
+ be able to take control of your Bugzilla installation.
+ </note>
+ </para>
<para>
On Apache, you can use .htaccess files to protect access
to these directories, as outlined in <ulink url="http://bugzilla.mozilla.org/show_bug.cgi?id=57161">Bug 57161</ulink> for the localconfig file, and <ulink url="http://bugzilla.mozilla.org/show_bug.cgi?id=65572"> Bug 65572</ulink> for adequate protection in your data/ and shadow/ directories.
diff --git a/docs/xml/administration.xml b/docs/xml/administration.xml
index 63a761095..8794a0e2c 100644
--- a/docs/xml/administration.xml
+++ b/docs/xml/administration.xml
@@ -1366,6 +1366,19 @@ Group3, since he isn't in Group4.
(e.g.: <ulink url="http://bugzilla.mozilla.org/localconfig"> http://bugzilla.mozilla.org/localconfig</ulink>). If you can read the contents of this file, your web server has not secured your bugzilla directory properly and you must fix this problem before deploying Bugzilla. If, however, it gives you a "Forbidden" error, then it probably respects the .htaccess conventions and you are good to go.
</para>
</note>
+ <para>
+ When you run checksetup.pl, the script will attempt to modify various
+ permissions on files which Bugzilla uses. If you do not have a
+ webservergroup set in the localconfig file, then Bugzilla will have to
+ make certain files world readable and/or writable. <emphasis>THIS IS
+ INSECURE!</emphasis>. This means that anyone who can get access to
+ your system can do whatever they want to your Bugzilla installation.
+ <note>
+ This also means that if your webserver runs all cgi scripts as the
+ same user/group, anyone on the system who can run cgi scripts will
+ be able to take control of your Bugzilla installation.
+ </note>
+ </para>
<para>
On Apache, you can use .htaccess files to protect access
to these directories, as outlined in <ulink url="http://bugzilla.mozilla.org/show_bug.cgi?id=57161">Bug 57161</ulink> for the localconfig file, and <ulink url="http://bugzilla.mozilla.org/show_bug.cgi?id=65572"> Bug 65572</ulink> for adequate protection in your data/ and shadow/ directories.