The examples should also do a better job of protecting sensitive
directories.  Here are my suggestions

    DocumentRoot /usr/share/bugzilla3/web
    Alias /cgi-bin /usr/lib/cgi-bin/bugzilla3
    Alias /data /var/lib/bugzilla3/data

    RewriteEngine On
    RewriteRule ^/(.*\.cgi.*) /cgi-bin/$1 [PT]
    RewriteRule ^/index.html$ /cgi-bin/index.cgi [PT]
    RewriteLog "/var/log/apache2/rewrite.log"
    RewriteLogLevel 2

    <Directory "/usr/lib/cgi-bin/bugzilla3">
           AllowOverride None
           Options +ExecCGI -MultiViews +SymLinksIfOwnerMatch
           Order allow,deny
           Allow from all
           AddHandler cgi-script .cgi
    </Directory>

    <Directory "/var/lib/bugzilla3/data">
           deny from all
    </Directory>

    <Directory "/usr/share/bugzilla3/web/shadow">
           deny from all
    </Directory>

    <FilesMatch ^(.*\.pm|.*\.pl|.*localconfig.*)$>
        deny from all
    </FilesMatch>

-- 
/usr/share/doc/bugzilla3/examples/vh-*.conf files faulty
https://bugs.launchpad.net/bugs/386608
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to