博客
关于我
强烈建议你试试无所不能的chatGPT,快点击我
Is your .svn showing (like 3300 other sites)?
阅读量:2435 次
发布时间:2019-05-10

本文共 2342 字,大约阅读时间需要 7 分钟。

has an article (pointing back to a Russian security company (translated link)), detailing a scan of 2,253,388 web sites which yielded an amazing 3,320 Subversion's .svn directories.

In case you're you're not familiar with Subversion, it is a version control system similar to CVS. It's .svn directory is likely to have a wealth of information for attackers--account names of developers, change histories, and the most importantly, full copies of source code which may be served in plain text rather than executed on the server side.

At best, disclosure of source code will give your attacker great insight into how things operate and point out any "hidden" files. At worst, this will let attackers find a flaw that leads to compromise of your server. Clearly, neither of those are desireable outcomes.

To check your website for a .svn directory (and don't forget to look for a "cvs" directory as well), there are several options (more than one is probably appropriate):

  • Use a web browser
  • Use an operating system level search (Windows/Unix find)
  • Run a web security scanner (may I suggest WebInspect?)
  • Even try Google (for example: ).

And don't forget that the .svn directory may exist in any location, not just the web root.

If you find one, you should take several steps to resolve the situation:

  • Move the .svn directory to someplace inaccessible via the web site
  • Reconfigure your web server to not serve files/directories that begin with a dot
  • Check , and other sites which cache web sites to ensure your source code is not still available--if it is, follow the site's procedure for requesting the content be removed
  • Thoroughly review all exposed files (whether or not you have evidence that they were accessed) to look for user IDs, passwords, database connection strings, etc., and if you find any: change them immediately

The authors of the survey attempted to contact all the sites via email. If you suspect you were on the list and didn't recieve the warning, you may want to review your mail handling procedures, ensure you have appropriate contact email addresses (see for more info), and add your company to to allow third parties to more easily contact you.

 WebInspect will help to ensure the security of your web applications by locating insecure .svn directories. Simply SmartUpdate to receive the latest checks and methodologies.

转载地址:http://bgmmb.baihongyu.com/

你可能感兴趣的文章
java单元测试Junit实践(一) Junit基础
查看>>
Webservice实践(二)Webservice 客户端开发
查看>>
Webservice实践(三)基于JDK的jax ws进行服务端开发
查看>>
Webservice实践(四)基于AXIS2的服务端开发
查看>>
Ubuntu12.04下安装eclipse C/C++开发环境
查看>>
Eclipse中10个最有用的快捷键组合
查看>>
Routing
查看>>
json相关学习
查看>>
linux下access函数的应用
查看>>
linux系统调用之文件:递归删除非空目录
查看>>
linux下获取系统时间的方法
查看>>
ubuntu12.04安装openCV2.4.6.1
查看>>
jsp与servlet的作用以及区别--为什么说JSP底层就是一个Servlet
查看>>
看HashMap源码前的必备冷知识,白话文式教学,适合刚开始了解源码的新手观看
查看>>
Oracle安装指南
查看>>
Redis面试必备(一)
查看>>
Cookie对象入门详解
查看>>
HashMap的remove()方法详解
查看>>
单例模式-分解步骤,逐步解析
查看>>
通过Form表单一次性拿到json格式数据,及后台接收
查看>>