I purged the offending code, but I'm left boggled. How about a contest? I'll award my ++'s to the most creative ways of abusing this code.sub parse_vars { $query= new CGI; if (param){ foreach $name (param()) { $value = param($name); if($value eq ""){$value="n/a";} $parms = "\$".$name."=\$query->param(\'$name\');"; eval $parms; } } }
In reply to Can we top this security problem? by swiftone
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |