(crossposted on Stackoverflow http://stackoverflow.com/questions/35301657/dancerpluginemail-module-is-data-tainted)
When using the Dancer::Plugin::Email module,should you check the user input for malicious data or is the input automatically tainted etc?
Although Dancer specific, does in the general case that the server runs as root and the untrusted user input passes a system("rm -rf *") or something along those lines that is then fed to the sendmail executable pose a risk and opens the can of worms?
Is that why it is recommended to run the webserver as a limited privilege user?
In reply to Dancer::Plugin::Email module - Is data tainted? by Anonymous Monk
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |