php curl_exec vulnerability with cloudlinux
Forum
  1. Forums
  2. CloudLinux and Control Panels
  3. CloudLinux and cPanel
  1. Majed
  2. Tuesday, 18 September 2018
  3.  Subscribe via email
Dear Guys,

I've installed cpanel with cloudlinux and cagefs.
I want to know some details about php function's vulnerabilities.
many of our customers need some functions like curl_exec, phpinfo , ... .
Is there any vulnerability with those functions (specially curl_exec) I mentioned above?
Please share with me.
Thank you very much.

Regards.
Rate this post:
  1. 19.09.2018 17:09:38
  2. # 1
Igor Ghertesco Accepted Answer
Posts: 154
Joined: 07.08.2015
0
Votes
Undo
Hello,

Each user's process is executed inside the "cage", i.e. the real file system is not visible to the customer. So it is pretty safe to allow using required PHP functions. In other words, the user won't be able to harm the server if the account will be compromised, but it does not protect the account from customer's software vulnerabilities, such as outdated CMS, etc
  • Page :
  • 1


There are no replies made for this post yet.
Be one of the first to reply to this post!
Guest
Submit Your Response
Upload files or images for this discussion by clicking on the upload button below. Supports gif,jpg,png,zip,rar,pdf
• Insert • Remove Upload Files (Maximum File Size: 2 MB)
Captcha
To protect the site from bots and unauthorized scripts, we require that you enter the captcha codes below before posting your question.
By submitting the response, you agree with Cloudlinux Privacy Policy