From 04fd648fa95c624466fd1ba626fa4ef02c089a72 Mon Sep 17 00:00:00 2001 From: "bbaetz%student.usyd.edu.au" <> Date: Tue, 7 May 2002 16:09:42 +0000 Subject: Bug 140355 - warn the user about not using a webserver group r=gerv, justdave --- docs/xml/administration.xml | 13 +++++++++++++ 1 file changed, 13 insertions(+) (limited to 'docs/xml/administration.xml') diff --git a/docs/xml/administration.xml b/docs/xml/administration.xml index 63a761095..8794a0e2c 100644 --- a/docs/xml/administration.xml +++ b/docs/xml/administration.xml @@ -1366,6 +1366,19 @@ Group3, since he isn't in Group4. (e.g.: http://bugzilla.mozilla.org/localconfig). If you can read the contents of this file, your web server has not secured your bugzilla directory properly and you must fix this problem before deploying Bugzilla. If, however, it gives you a "Forbidden" error, then it probably respects the .htaccess conventions and you are good to go. + + When you run checksetup.pl, the script will attempt to modify various + permissions on files which Bugzilla uses. If you do not have a + webservergroup set in the localconfig file, then Bugzilla will have to + make certain files world readable and/or writable. THIS IS + INSECURE!. This means that anyone who can get access to + your system can do whatever they want to your Bugzilla installation. + + This also means that if your webserver runs all cgi scripts as the + same user/group, anyone on the system who can run cgi scripts will + be able to take control of your Bugzilla installation. + + On Apache, you can use .htaccess files to protect access to these directories, as outlined in Bug 57161 for the localconfig file, and Bug 65572 for adequate protection in your data/ and shadow/ directories. -- cgit v1.2.3-24-g4f1b