in reply to Re^6: Taint and Shellshock
in thread Taint and Shellshock
Thank you both, tobyink and kennethk, for the explanations. I have definitely learned from your comments.
UPDATE: Also instructive is an article -- cited in this (Mon, 2014-09-29) morning's Perlweekly -- by David Farrell. In essence, my view is both undermined and supported there:
As I now understand it, a BAD_ENV can be injected into the params passed to the server's CGI script, and (more-or-less) easily. But getting the malware into the server's environment requires -- at least as I now understand it -- that the server's owner/CGI-writer has failed to use taint to force the server-side code to effectively assess each of the params being provided by the outside user and prevent passage of meta-characters which are (TBO our current knowledge) required to make bash execute the malware writer's payload.
If I still have this wrong, pray continue my edumuckation....
|
|---|
| Replies are listed 'Best First'. | |
|---|---|
|
Re^8: Taint and Shellshock
by kennethk (Abbot) on Sep 29, 2014 at 17:50 UTC | |
by Corion (Patriarch) on Sep 29, 2014 at 17:58 UTC | |
by kennethk (Abbot) on Sep 29, 2014 at 20:28 UTC |