Ok. I'm prepared for major downvotes for even doubting the Monks on this. But it is popular opinion here that Matt's Script Archive (MSA) formmail.pl is "insecure". To me "insecure" means that using this script will cause your web server to become vulnerable to attack of the type which allows access by unauthorized individuals. This is a separate and distinct failing in a script from the lesser affliction "easily broken"-- which simply means that the script can be caused to fail due to programming errors that failed to account for some input.
The code below is, I think, the most recent MSA formmail.pl and even I can see that it is easily broken. But is it insecure? If it is insecure, why is it that there isn't a Code RedHat worm crawling the web looking for pages with forms that submit to a script called formmail.pl? MSA formmail.pl is extremely common, after all.
I will point out some obvious flaws, and artifacts to get the discussion going, but none of these are server-endangering in any capacity that I'm aware of. If they are, the Perl Monks community has an opportunity to make sure that we review and publicize the existence of a secure alternative (perhaps btrott's STAMP), and get it on CPAN. If nothing else, the replies to this post of mine will serve as further information for the curious.
The flaws that I notice:
|
---|
Replies are listed 'Best First'. | |
---|---|
Re: Exploit this formmail.pl for fun and, well, fun. (LONG)
by chipmunk (Parson) on Aug 07, 2001 at 18:11 UTC | |
Re: Exploit this formmail.pl for fun and, well, fun. (LONG)
by Cirollo (Friar) on Aug 08, 2001 at 00:04 UTC | |
by runrig (Abbot) on Aug 08, 2001 at 00:44 UTC | |
Re: Exploit this formmail.pl for fun and, well, fun. (LONG)
by Mr.T (Sexton) on Aug 09, 2001 at 21:20 UTC | |
by ichimunki (Priest) on Aug 10, 2001 at 01:33 UTC | |
by Mr.T (Sexton) on Aug 10, 2001 at 01:38 UTC |