in reply to Re^2: eval() and security
in thread eval() and security
I did not mean it as a literal runnable example, or I would have put it in code tags.
The key point is that you can run arbitrary code (provided it parses) inside a regex match. If you allow user data into the regex match, then the sky is the limit for exploits. (As anonymonk shows above, Taint mode is smart enough to hate that sort of thing)
|
|---|
| Replies are listed 'Best First'. | |
|---|---|
|
Re^4: eval() and security
by Anonymous Monk on Nov 24, 2009 at 17:59 UTC | |
by ikegami (Patriarch) on Nov 24, 2009 at 18:23 UTC | |
by Anonymous Monk on Nov 24, 2009 at 23:46 UTC | |
|
Re^4: eval() and security
by halfcountplus (Hermit) on Nov 24, 2009 at 18:07 UTC |