From 5b38103bce29e0d777182fbc12f9e702cedc9b85 Mon Sep 17 00:00:00 2001
From: "bbaetz%student.usyd.edu.au" <>
Date: Fri, 4 Apr 2008 11:47:02 +0000
Subject: Bug 140355 - warn the user about not using a webserver group r=gerv,
justdave
---
docs/en/xml/administration.xml | 13 +++++++++++++
1 file changed, 13 insertions(+)
(limited to 'docs')
diff --git a/docs/en/xml/administration.xml b/docs/en/xml/administration.xml
index 63a761095..8794a0e2c 100644
--- a/docs/en/xml/administration.xml
+++ b/docs/en/xml/administration.xml
@@ -1366,6 +1366,19 @@ Group3, since he isn't in Group4.
(e.g.: http://bugzilla.mozilla.org/localconfig). If you can read the contents of this file, your web server has not secured your bugzilla directory properly and you must fix this problem before deploying Bugzilla. If, however, it gives you a "Forbidden" error, then it probably respects the .htaccess conventions and you are good to go.
+
+ When you run checksetup.pl, the script will attempt to modify various
+ permissions on files which Bugzilla uses. If you do not have a
+ webservergroup set in the localconfig file, then Bugzilla will have to
+ make certain files world readable and/or writable. THIS IS
+ INSECURE!. This means that anyone who can get access to
+ your system can do whatever they want to your Bugzilla installation.
+
+ This also means that if your webserver runs all cgi scripts as the
+ same user/group, anyone on the system who can run cgi scripts will
+ be able to take control of your Bugzilla installation.
+
+
On Apache, you can use .htaccess files to protect access
to these directories, as outlined in Bug 57161 for the localconfig file, and Bug 65572 for adequate protection in your data/ and shadow/ directories.
--
cgit v1.2.3-24-g4f1b