On Fri, Mar 12, 2010 at 3:28 PM,  <kj...@pintday.org> wrote:
>> Very good suggestion, indeed.
>>
>> Especially, if someone has a 'dangerous' file, a PHP Shell for instance,
>> (a perfect example: 
>> http://mgeisler.net/downloads/phpshell/phpshell-1.7.tar.gz)
>> inside such a directory. (Or even maybe a simple file uploader, that will
>> help the attacker to upload such 'shell-over-http' files.)
>
> Also, think "emacs-turdfile". Have any config.php~ lying around?
>
> or index.php~?
>
> Are you SURE?

If you have an index.php~ file, then you have an index.php file, and
apache won't list the directory contents, so you're safe.

Except an attacker can still download index.php~ even without an
index.  So the change does nothing.

Reply via email to