[prev in list] [next in list] [prev in thread] [next in thread]
List: security-basics
Subject: Re: Application Pool - Service Account Permissions
From: krymson () gmail ! com
Date: 2011-07-21 17:57:52
Message-ID: 201107211757.p6LHvq47025026 () sf01web2 ! securityfocus ! com
[Download RAW message or body]
That is indeed a high risk. I'm not sure if they apply to IIS 7.5/Server 2008, but \
there have been recent .NET patches from Microsoft that fix issues where malicious \
code can take over that app pool account, especially if you allow users to upload \
content into a web-executable location.
Almost certainly, giving local admin rights is the poor (or time-starved) man's \
solution to, "My app isn't running because of a permissions problem." It certainly is \
correct to open up with a test under local admin rights, but to stop there is a \
travesty. More than likely the account just needs a few 'read' and maybe (if you're \
unlucky) some 'modify' rights on various local locations on the server. Some time \
taken during testing to have a sys admin watch execution using Filemon should reveal \
any needs.
Since you're using the same account across a few systems, perhaps this gets a bit \
hairy. I'm not sure the whole "dmz web farm" and "internal web farm" separation is \
strictly adhered to these days. Often you get the web (IIS 7.5) and app (app pool) \
"separated" but really just running on the same box.
It is certainly possible it does need high rights, if it is so poorly written and \
relies on way more things on the server than it should, but the app owner should \
still know every specific reason why.
Also, hopefully your developers don't have access to that service account password!
<- snip ->
Hi Folks,
Just wants to see what your thoughts were on an 2008R2 IIS7.5 application
pool identity user having local administrative privileges for a complex
internet facing .net web application? I was always taught that this is
high risk, but maybe things have changed. The basic setup is supposed to
be this. A front end (dmz zone) web farm, back end (trust zone) web farm ,
all connected to the same domain, using the same domain service account
that will need to be in the local administrators group on all the servers.
I have a feeling the application can be coded differently and I don't have
a real answer yet to why it needs to be this way.
Anyone have any thoughts?
Thanks in advance!!
------------------------------------------------------------------------
Securing Apache Web Server with thawte Digital Certificate
In this guide we examine the importance of Apache-SSL and who needs an SSL \
certificate. We look at how SSL works, how it benefits your company and how your \
customers can tell if a site is secure. You will find out how to test, purchase, \
install and use a thawte Digital Certificate on your Apache web server. Throughout, \
best practices for set-up are highlighted to help you ensure efficient ongoing \
management of your encryption keys and digital certificates.
http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1
------------------------------------------------------------------------
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic