We have a security measure in place in PHP on all servers called "open_basedir". This is where PHP scripts are restricted with regard to what parts of the server filesystem they can access.

We maintain a list of areas where PHP scripts are allowed to access (/home/username, /tmp + others) and if a script attempts to access a file or directory elsewhere on the filesystem it will result in an error relating to "open_basedir". This stops PHP scripts accessing directories and files owned by other users, specific to the server config and root user, etc.

It is rare that the allowed paths list will need modification for any user. However, sometimes an alteration is required for some scripts to function properly (eg ModernBill). If you think this applies to you, please contact our support team remembering to include the full error message and domain name and we'll investigate.


Was this answer helpful?

Related Articles

Using scripts in your account that are insecure (vulnerabilities unpatched) is very dangerous. Doing so runs the risk of account suspension or...
An excellent resource for users of PHP is http://www.devshed.com/c/b/php/ They also have a nice forum where you can ask questions:...
The path to Perl on our servers is: /usr/bin/perl
PHP code can be a very useful tool but also very dangerous if not used correctly. There are many coding mistakes that can lead to hacked websites,...
Yes we allow you to run FromMail type scripts, we strongly recommend that you use the nmsFormMail script for your "form to email" script rather...