in reply to Re^6: Question using system.
in thread Question using system.
An injection attack occurs when data is treated as code, possibly due to improper escaping.
It can occur in SQL statements.
It can occur in shell command lines.
It can occur in evaled strings.
It can occur in HTML (known as Cross-Site Scripting)
etc.
What if $file holds "| rm -rf /"? It's even a perfectly valid path, so it's not a validation issue.
Update: Added links. Refined definition.
|
|---|
| Replies are listed 'Best First'. | |
|---|---|
|
Re^8: Question using system.
by oko1 (Deacon) on Jul 10, 2008 at 22:10 UTC | |
by ikegami (Patriarch) on Jul 10, 2008 at 22:18 UTC |