in reply to Re^3: Taint and Shellshock
in thread Taint and Shellshock
From my understanding, Perl will not raise any issue in the scenario where my_prog accesses BAD_VAR, and hence %ENV can be used to bypass taint. Is this not correct?#!/usr/bin/perl -wT print "Content-type: text/plain\n\n"; local $ENV{PATH} = '/usr/local/bin'; print `my_prog 12345`;
#11929 First ask yourself `How would I do this without a computer?' Then have the computer do it the same way.
|
|---|
| Replies are listed 'Best First'. | |
|---|---|
|
Re^5: Taint and Shellshock
by ww (Archbishop) on Sep 28, 2014 at 03:47 UTC | |
by tobyink (Canon) on Sep 28, 2014 at 20:40 UTC | |
by ww (Archbishop) on Sep 29, 2014 at 02:20 UTC | |
by kennethk (Abbot) on Sep 29, 2014 at 17:50 UTC | |
by Corion (Patriarch) on Sep 29, 2014 at 17:58 UTC | |
| |
by kennethk (Abbot) on Sep 28, 2014 at 15:51 UTC |