All users have write access to the LGP server code #32

Closed
opened 2021-08-22 01:30:59 +00:00 by a · 2 comments
Owner

The LGP server code is located at /srv/http/LGP-Server and is currently writable by anyone. This is a security issue because a user could edit the main.py code to do something malicious and it could be then be executed. Alternatively, users can read and modify the LGP server database which is also bad. One possible solution is to only give access to the LGP server devs, namely me and spicecat.

The LGP server code is located at `/srv/http/LGP-Server` and is currently writable by anyone. This is a security issue because a user could edit the `main.py` code to do something malicious and it could be then be executed. Alternatively, users can read and modify the LGP server database which is also bad. One possible solution is to only give access to the LGP server devs, namely me and spicecat.
a added the
security
bug
labels 2021-08-22 01:30:59 +00:00
a added this to the (deleted) project 2021-08-22 01:31:14 +00:00
Author
Owner

I'm setting the permissions on the LGP server code to only writable by me and I can give access to anyone that wants it with setfacl.

I'm setting the permissions on the LGP server code to only writable by me and I can give access to anyone that wants it with `setfacl`.
a closed this issue 2021-08-26 15:36:47 +00:00
Author
Owner

setfacl -Rm u:spicecat:rwX . does this nicely, and I'll give other people access if they want it as well.

`setfacl -Rm u:spicecat:rwX .` does this nicely, and I'll give other people access if they want it as well.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: exozyme/exozyme#32
No description provided.