Hi all,
I'm interested to enable fastcgi and suExec with apache22 to execute php scripts with limited permission on virtual hosts but I've never done it.
According to my informations, suExec requires a valid uid/gid to set correct permissions to run scripts hosted inside ftp user's document root.
Using PureFTP, there is only one uid/gid which contains all my virtual ftp users (I've used PureDB to store them).
I suppose that I've to specify, for each vhost inside my httpd-vhosts.conf, a user and group to run as (directive User and/or SuexecUserGroup) and I think I've to set PureFTP ones.
Is there any risk, with malicious php code stored inside one virtual ftp account, to steal informations inside other virtual ftp paths, owned by the same uid/gid (PureFTP ones)?
Is there any apache directive to prevent this kind of problem?
Thanks in advance
I'm interested to enable fastcgi and suExec with apache22 to execute php scripts with limited permission on virtual hosts but I've never done it.
According to my informations, suExec requires a valid uid/gid to set correct permissions to run scripts hosted inside ftp user's document root.
Using PureFTP, there is only one uid/gid which contains all my virtual ftp users (I've used PureDB to store them).
I suppose that I've to specify, for each vhost inside my httpd-vhosts.conf, a user and group to run as (directive User and/or SuexecUserGroup) and I think I've to set PureFTP ones.
Is there any risk, with malicious php code stored inside one virtual ftp account, to steal informations inside other virtual ftp paths, owned by the same uid/gid (PureFTP ones)?
Is there any apache directive to prevent this kind of problem?
Thanks in advance