in reply to Re: Bad Practice
in thread Bad Practice
You also say that this code allows to create any variable he wishes. I've looked at the given code a few times, but I can't see what you see. Unless you see a way of the web user being able to manipulate %input, I don't see how he can.
Right after the call to readparse, there is a foreach which loops through %input and creates global variables for every element in the hash. As a contrived example, this could allow the browser to change the process name, by submitting a form containing <input type=hidden name="0" value="HA! HA! GOT YOU!">. If the rest of the code is as insecure as this, you could have a lot of fun with this site.
|
|---|
| Replies are listed 'Best First'. | |
|---|---|
|
Re: Bad Practice
by Abigail-II (Bishop) on Feb 27, 2003 at 16:11 UTC | |
by ChemBoy (Priest) on Feb 27, 2003 at 16:36 UTC | |
by ihb (Deacon) on Feb 27, 2003 at 16:35 UTC |