Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

CHMOD files which have been created by CGI?

Posted on 1997-05-10
3
Medium Priority
?
162 Views
Last Modified: 2013-12-25
I have a set of files in a directory that I want to make read and writeable.

However these files will not respond to any chmodding request and they return: Operation not permitted.

Is this because they were created using a cgi program? How can I overcome this problem?

This is an urgent request.

Thank You.
0
Comment
Question by:Jmz
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 

Expert Comment

by:cyber020197
ID: 1827997
Do you get this error message when trying to chmod them at the command prompt.  If so, it's most likely do to the files being owned by user 'nobody', the standard uid for web servers.

If this is the case I've an answer for you.

regards,
scottwimer

0
 
LVL 1

Accepted Solution

by:
Fordream earned 400 total points
ID: 1827998
Have you tried chmodding with CGI? Check following 2 cases.

 First, a case that you tried to chmod file(s) are not owned by nobody. Unless CGI is not setuided, CGI runs without any permittion, expecting nobody's. If so, you can chmod with CGI by giving your CGI some permittions.(changing CGI's owner, setuid-ing your CGI, etc..)

 Second, a case that you made CGI with Perl script. Perl is very secured language. It prohibits many things having security violations. For more informations about perl security, you can find it from man page by typing "man perlsec" in shell prompt. Or I can send you that document if you can't find it.

0
 

Author Comment

by:Jmz
ID: 1827999
Thanks for the suggestions,

I did make the files with perl,

but *how* exactly do I fix it?
0

Featured Post

Important Lessons on Recovering from Petya

In their most recent webinar, Skyport Systems explores ways to isolate and protect critical databases to keep the core of your company safe from harm.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this tutorial I will focus on how to use WhizBase as a tool for sending ICQ messages to ICQ. Here I will use a new technology in WhizBase, published in WhizBase 5.1 version. In this tutorial I will use 3 files, pager.wbsp for the processing, e…
Making a simple AJAX shopping cart Couple years ago I made my first shopping cart, I used iframe and JavaScript, it was very good at that time, there were no sessions or AJAX, I used cookies on clients machine. Today we have more advanced techno…
The viewer will learn how to look for a specific file type in a local or remote server directory using PHP.
In this fifth video of the Xpdf series, we discuss and demonstrate the PDFdetach utility, which is able to list and, more importantly, extract attachments that are embedded in PDF files. It does this via a command line interface, making it suitable …
Suggested Courses

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question