<tfoot id='36Iym'></tfoot>

    1. <legend id='36Iym'><style id='36Iym'><dir id='36Iym'><q id='36Iym'></q></dir></style></legend>

    2. <small id='36Iym'></small><noframes id='36Iym'>

        <bdo id='36Iym'></bdo><ul id='36Iym'></ul>
    3. <i id='36Iym'><tr id='36Iym'><dt id='36Iym'><q id='36Iym'><span id='36Iym'><b id='36Iym'><form id='36Iym'><ins id='36Iym'></ins><ul id='36Iym'></ul><sub id='36Iym'></sub></form><legend id='36Iym'></legend><bdo id='36Iym'><pre id='36Iym'><center id='36Iym'></center></pre></bdo></b><th id='36Iym'></th></span></q></dt></tr></i><div id='36Iym'><tfoot id='36Iym'></tfoot><dl id='36Iym'><fieldset id='36Iym'></fieldset></dl></div>

      设置上传文件夹 777 权限是否安全?

      Is setting the uploads folder 777 permission secure?(设置上传文件夹 777 权限是否安全?)

          <bdo id='AIKWm'></bdo><ul id='AIKWm'></ul>
            <i id='AIKWm'><tr id='AIKWm'><dt id='AIKWm'><q id='AIKWm'><span id='AIKWm'><b id='AIKWm'><form id='AIKWm'><ins id='AIKWm'></ins><ul id='AIKWm'></ul><sub id='AIKWm'></sub></form><legend id='AIKWm'></legend><bdo id='AIKWm'><pre id='AIKWm'><center id='AIKWm'></center></pre></bdo></b><th id='AIKWm'></th></span></q></dt></tr></i><div id='AIKWm'><tfoot id='AIKWm'></tfoot><dl id='AIKWm'><fieldset id='AIKWm'></fieldset></dl></div>

              <legend id='AIKWm'><style id='AIKWm'><dir id='AIKWm'><q id='AIKWm'></q></dir></style></legend><tfoot id='AIKWm'></tfoot>

              1. <small id='AIKWm'></small><noframes id='AIKWm'>

                  <tbody id='AIKWm'></tbody>
              2. 本文介绍了设置上传文件夹 777 权限是否安全?的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着跟版网的小编来一起学习吧!

                问题描述

                我见过很多上传表单被黑客入侵,其中一些对正在上传的文件进行了一些非常好的安全检查(至少我是这么认为的),但仍然有人设法上传了一个 PHP 文件.

                I have seen a lot of upload forms hacked, and some had some really good security checks of the file being uploaded (at least I think so), but still somebody managed to upload a PHP file.

                我想知道:有没有办法在具有 777 权限的上传文件夹中上传文件?我正在考虑使用 HTTP PUT.

                I was wondering: is there is a way to upload a file in the uploads folder that has 777 permissions? I am thinking of using HTTP PUT.

                推荐答案

                一般来说 777 几乎是不安全...这意味着任何人都可以读取和写入您的文件.

                In general 777 is about as insecure as it gets... that means anybody can read and write to your files.

                如果您允许在您的服务器上执行上传的文件,那么 HTTP PUT 本质上并不比 HTTP POST 更安全.

                HTTP PUT isn't inherently any more secure than HTTP POST if you're allowing the uploaded files to be exceuted on your server.

                总体而言,如果您允许执行任意文件,则需要在服务器端进行非常好的文件检查,并且在服务器上使用 chroot 是明智的.

                Overall, if you are allowing arbitrary files to be executed you need to be doing very good file checking server-side, and using chroot on the server would be wise.

                在权限方面,我通常将任何可通过网络访问的内容设置为网络服务器用户拥有的 644.

                Permission-wise, I generally set anything web-accessible to 644 owned by the webserver user.

                这篇关于设置上传文件夹 777 权限是否安全?的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持跟版网!

                本站部分内容来源互联网,如果有图片或者内容侵犯了您的权益,请联系我们,我们会在确认后第一时间进行删除!

                相关文档推荐

                PHP Upload File Validation(PHP 上传文件验证)
                PHP Error - Uploading a file(PHP 错误 - 上传文件)
                How can I write tests for file upload in PHP?(如何在 PHP 中编写文件上传测试?)
                php resizing image on upload rotates the image when i don#39;t want it to(php在上传时调整图像大小会在我不想要它时旋转图像)
                How to send additional data using PLupload?(如何使用 PLupload 发送附加数据?)
                change button text in js/ajax after mp4 =gt;mp3 conversion in php(在 php 中的 mp4 =gt;mp3 转换后更改 js/ajax 中的按钮文本)

                <small id='TBlfZ'></small><noframes id='TBlfZ'>

                    <tfoot id='TBlfZ'></tfoot>
                      <legend id='TBlfZ'><style id='TBlfZ'><dir id='TBlfZ'><q id='TBlfZ'></q></dir></style></legend>
                      <i id='TBlfZ'><tr id='TBlfZ'><dt id='TBlfZ'><q id='TBlfZ'><span id='TBlfZ'><b id='TBlfZ'><form id='TBlfZ'><ins id='TBlfZ'></ins><ul id='TBlfZ'></ul><sub id='TBlfZ'></sub></form><legend id='TBlfZ'></legend><bdo id='TBlfZ'><pre id='TBlfZ'><center id='TBlfZ'></center></pre></bdo></b><th id='TBlfZ'></th></span></q></dt></tr></i><div id='TBlfZ'><tfoot id='TBlfZ'></tfoot><dl id='TBlfZ'><fieldset id='TBlfZ'></fieldset></dl></div>
                      • <bdo id='TBlfZ'></bdo><ul id='TBlfZ'></ul>

                            <tbody id='TBlfZ'></tbody>