RE: Security bug in CGI::Lite::escape_dangerous_chars() function

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello Ronald and all others

You might be correct with the issue of
escape_dangerous_chars but instead of the technic you
showed

>>open (SM, "|/usr/sbin/sendmail -f rfg $recipient");

I would use

open(SM, "|/usr/sbin/sendmail -oi -t") || die
"sendmail";
...
print SM "To: $recipient\n";

I think an attacker may cause less harm with this
approach even if escape_dangerous_chars is buggy.

HC

__________________________________________________
Do you Yahoo!?
Yahoo! Shopping - Send Flowers for Valentine's Day
http://shopping.yahoo.com

[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux