in reply to Re^7: Taint problems
in thread Taint problems
I was only trying to show how easy it is to manipulate $0.
Why are you trying to show that? Changing $0 isn't bad, as long as it points to the script being executed.
there's plenty of reasons to taint it
"Plenty"? I'd be interested in hearing some. I can only think of one, the ability to change the file to which the file name points after perl has read it. Mind you, that one reason is enough to warrant tainting.
In C it's easy to manipulate argv[0] with the exec family
Aye, for all binary executables, it's possible to execute the program will telling it it's a different file.
That doesn't work work for script executables (such as Perl), because the interpreter must be able to locate the script to execute.
|
|---|
| Replies are listed 'Best First'. | |
|---|---|
|
Re^9: Taint problems
by rowdog (Curate) on Dec 14, 2008 at 18:58 UTC | |
by ikegami (Patriarch) on Dec 14, 2008 at 22:30 UTC |