[GH-ISSUE #110] Add Server dashboard #2733

Closed
opened 2026-04-19 04:56:07 -05:00 by GiteaMirror · 6 comments
Owner

Originally created by @joubertredrat on GitHub (Sep 9, 2015).
Original GitHub issue: https://github.com/awesome-foss/awesome-sysadmin/issues/110

https://github.com/Kickball/awesome-selfhosted/issues/262

Originally created by @joubertredrat on GitHub (Sep 9, 2015). Original GitHub issue: https://github.com/awesome-foss/awesome-sysadmin/issues/110 https://github.com/Kickball/awesome-selfhosted/issues/262
Author
Owner

@n1trux commented on GitHub (Sep 26, 2015):

enabling shell_exec? This seems risky. Do you use it?

Apart from that: Please create a PR.

<!-- gh-comment-id:143412413 --> @n1trux commented on GitHub (Sep 26, 2015): enabling shell_exec? This seems risky. Do you use it? Apart from that: Please create a PR.
Author
Owner

@joubertredrat commented on GitHub (Sep 26, 2015):

Hi @n1trux
I'm PHP developer, don't have risky to use shell_exec with PHP because webserver generally runs as www-data or httpd user, then risky is low. I used this when I search a tool to local monitor my server, today I use PHPSysInfo.

<!-- gh-comment-id:143436486 --> @joubertredrat commented on GitHub (Sep 26, 2015): Hi @n1trux I'm PHP developer, don't have risky to use shell_exec with PHP because webserver generally runs as www-data or httpd user, then risky is low. I used this when I search a tool to local monitor my server, today I use PHPSysInfo.
Author
Owner

@n1trux commented on GitHub (Sep 26, 2015):

still with shell_exec you could gain access to files running under the very same httpd/www-data user, which may expose database passwords and other attack vectors.

<!-- gh-comment-id:143478440 --> @n1trux commented on GitHub (Sep 26, 2015): still with shell_exec you could gain access to files running under the very same httpd/www-data user, which may expose database passwords and other attack vectors.
Author
Owner

@xetch commented on GitHub (Sep 30, 2015):

👎 I wouldn't recommend adding an insecure program to the list.
@joubertredrat if you care about your security, you should stay away from using this.

<!-- gh-comment-id:144503201 --> @xetch commented on GitHub (Sep 30, 2015): :thumbsdown: I wouldn't recommend adding an insecure program to the list. @joubertredrat if you care about your security, you should stay away from using this.
Author
Owner

@joubertredrat commented on GitHub (Sep 30, 2015):

Ok, you decide, I will not put.

But shell_exec isn't insecure, applications is. When I need, I use shell_exec without problems, I have applications running since 3, 5, 6 years, this applications uses shell_exec and never had any trouble with this.

Then remember, shell_exec isn't insecure, applications is insecure, It depends on how the application was made.

<!-- gh-comment-id:144511039 --> @joubertredrat commented on GitHub (Sep 30, 2015): Ok, you decide, I will not put. But shell_exec isn't insecure, applications is. When I need, I use shell_exec without problems, I have applications running since 3, 5, 6 years, this applications uses shell_exec and never had any trouble with this. Then remember, shell_exec isn't insecure, applications is insecure, It depends on how the application was made.
Author
Owner

@xetch commented on GitHub (Sep 30, 2015):

@joubertredrat I didn't say shell_exec is insecure, it has it's purpose but there is a reason why shell_exec is usually disabled and why it should only be used sparingly.

<!-- gh-comment-id:144547216 --> @xetch commented on GitHub (Sep 30, 2015): @joubertredrat I didn't say shell_exec is insecure, it has it's purpose but there is a reason why shell_exec is usually disabled and why it should only be used sparingly.
Sign in to join this conversation.
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: github-starred/awesome-sysadmin#2733