Well, I was actually making a *shudder* joke. No, something as simple as injecting /etc/shadow into someone's list of files is not exactly tantamount to a root vulnerability. (But you should fear if someone injects etcshadow into your code.)
However, depending on what you were planning to do with that list of files, it might have been a Bad Thing to have /etc/shaddow injected into it... particularly if this script were being run as root.
In case you haven't noticed... using find with -print (which is the defualt command for find) is one of my pet-peeves.
Use -print0 or -exec.
Use -print0 or -exec!
Use -print0 or -exec!!!
example code:
my @files;
{
local $/="\0";
chomp (@files = `find . -print0`);
}
How hard was that? Now you have shut me down. You are l33t, and I am suX0rz.
------------
:Wq
Not an editor command: Wq
|