Vesta Control Panel - Forum

Community Forum

Skip to content

Advanced search
  • Quick links
    • Main site
    • Github repo
    • Google Search
  • FAQ
  • Login
  • Register
  • Board index Main Section General Discussion
  • Search

Security discussion

General questions about VestaCP
Post Reply
  • Print view
Advanced search
27 posts
  • Previous
  • 1
  • 2
  • 3
Spheerys
Posts: 225
Joined: Tue Dec 29, 2015 12:36 pm

Os: Debian 7x
Web: apache + nginx
Re: Security discussion
  • Quote

Post by Spheerys » Tue Oct 09, 2018 6:11 pm

@imperio make an answer here.
The project is not dead \o/
Top

ScIT
Support team
Posts: 617
Joined: Mon Feb 23, 2015 4:13 pm

Os: Ubuntu 17x
Web: apache + nginx
Re: Security discussion
  • Quote

Post by ScIT » Tue Oct 09, 2018 6:13 pm

Spheerys wrote: ↑
Tue Oct 09, 2018 6:11 pm
@imperio make an answer here.
The project is not dead \o/
Yes, have seen it already - thats a really good news!!! Let's take vesta alive - don't want to work without!
Top

alexcy
Posts: 256
Joined: Sun Jun 01, 2014 11:24 pm
Contact:
Contact alexcy
Website

Os: Ubuntu 15x
Web: nginx + php-fpm
Re: Security discussion
  • Quote

Post by alexcy » Tue Oct 09, 2018 6:34 pm

Very good news!
Top

neto737
Posts: 5
Joined: Thu Jun 16, 2016 7:51 pm

Re: Security discussion
  • Quote

Post by neto737 » Tue Oct 09, 2018 10:38 pm

I really agree with you @ctrlpac

I think that VestaCP could use password_hash and password_verify instead of md5, sha-512 and DES as well. The code could be cleaner than now and maybe it can be faster too.

I think the web interface needs to be refactored completely. Why using 1 folder for every URL? Never heard about url rewriting? So, I guess the PHP needs to be out from the front-end, like using a PHP framework or something else.

The team need to be open to getting help from us, and maybe the Vesta will grow up in sometime...
Top

R_O
Posts: 10
Joined: Wed Apr 03, 2019 1:39 am

Os: Ubuntu 17x
Web: apache + nginx
Re: Security discussion
  • Quote

Post by R_O » Wed Apr 03, 2019 1:44 am

ctrlpac wrote: ↑
Tue Sep 25, 2018 7:30 pm
A lot of redundant code was written using PHP. Example:

Code: Select all

	if ((!empty($_POST['user'])) && (empty($_POST['code']))) {
    		$v_user = escapeshellarg($_POST['user']);
    		$user = $_POST['user'];
    		$cmd="/usr/bin/sudo /usr/local/vesta/bin/v-list-user";
    		exec ($cmd." ".$v_user." json", $output, $return_var);
    		...
    		...
May you explain why this is not safe.
Top

pothi
Posts: 1
Joined: Thu Aug 31, 2017 6:08 pm

Re: Security discussion
  • Quote

Post by pothi » Wed Apr 03, 2019 1:56 pm

R_O wrote: ↑
Wed Apr 03, 2019 1:44 am
ctrlpac wrote: ↑
Tue Sep 25, 2018 7:30 pm
A lot of redundant code was written using PHP. Example:

Code: Select all

	if ((!empty($_POST['user'])) && (empty($_POST['code']))) {
    		$v_user = escapeshellarg($_POST['user']);
    		$user = $_POST['user'];
    		$cmd="/usr/bin/sudo /usr/local/vesta/bin/v-list-user";
    		exec ($cmd." ".$v_user." json", $output, $return_var);
    		...
    		...
May you explain why this is not safe.
No escape for user input on the line

Code: Select all

$user = $_POST['user'];
and on the "if" condition. The general practice is to never trust any user input.
Top

R_O
Posts: 10
Joined: Wed Apr 03, 2019 1:39 am

Os: Ubuntu 17x
Web: apache + nginx
Re: Security discussion
  • Quote

Post by R_O » Thu Apr 04, 2019 2:36 am

Code: Select all

	if ((!empty($_POST['user'])) && (empty($_POST['code']))) {
    		...
    		...
ctrlpac wrote: ↑
Tue Sep 25, 2018 7:30 pm
and on the "if" condition. The general practice is to never trust any user input.
Yes, I miss the 'user' assignation, but regarding the 'if', forgive my ignorance but Is there a vulnerability of the "empty" command. The manual tells it is just a Boolean for any validation since PHP 5.5. How can this affect the process if you sanitise the content right after you know that exists?
Top


Post Reply
  • Print view

27 posts
  • Previous
  • 1
  • 2
  • 3

Return to “General Discussion”



  • Board index
  • All times are UTC
  • Delete all board cookies
  • The team
Powered by phpBB® Forum Software © phpBB Limited
*Original Author: Brad Veryard
*Updated to 3.2 by MannixMD
 

 

cron

Login  •  Register

I forgot my password