in reply to Re: Re: Alternatives to User::Agent?
in thread Alternatives to User::Agent?

Just be careful after you do so to remove them again. (Allowing people to run arbitrary shell scripts is a security hole.)

UPDATE: bobn is right. The above script does not allow someone to run arbitrary code. This reply was just a knee-jerk response to seeing someone doing administration through running shell scripts in cgi-bin.

  • Comment on Re: Re: Re: Alternatives to User::Agent?

Replies are listed 'Best First'.
Re: Re: Re: Re: Alternatives to User::Agent?
by bobn (Chaplain) on Jul 20, 2003 at 17:24 UTC

    Where does the script run an abritrary shell script?

    --Bob Niederman, http://bob-n.com
      I agree, even though my script doesn't allow arbitrary code to be run, that leaving it lying around is a bad idea. If you're feeling particularly paranoid, you can create an admin directory of cgi-bin with a .htaccess file that protects them with a password.