in reply to Re^2: Browser::Open Windows metacharacters
in thread Browser::Open Windows metacharacters

Make sure you trust the source of the URLs. Otherwise it's still a shell injection: try passing a $url = q["$(touch ~/hello.txt)"] if you're on Linux or maybe $url = q["&calc&"] on Windows (not sure about the CMD syntax, but it's definitely possible to construct a string that would cause a command to be run when wrapped in double quotes).

Replies are listed 'Best First'.
Re^4: Browser::Open Windows metacharacters
by IB2017 (Pilgrim) on Dec 09, 2018 at 22:13 UTC

    Thank you for pointing me to this threat. In this case my script generates the URLs, so it should be fine.