[492] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: Security risks with CGI

daemon@ATHENA.MIT.EDU (Phillip M. Hallam-Baker)
Thu Mar 2 10:11:10 1995

To: Garrett Burke <gburke@dsg.cs.tcd.ie>, www-security@ns2.rutgers.edu
cc: hallam@dxal18.cern.ch
In-reply-to: Your message of "Thu, 02 Mar 1995 09:23:06 GMT."
             <9503020923.aa17977@longvalley.dsg.cs.tcd.ie> 
Date: 	Thu, 02 Mar 1995 11:37:43 +0900
From: "Phillip M. Hallam-Baker" <hallam@dxal18.cern.ch>
Errors-To: owner-www-security@ns2.rutgers.edu


>I'm looking for a comprehensive list of security risks with using CGI
>scripts.

It would be a very long one indeed.

I personally think the CGI-script idea was a bad one from the start. If you are
security concious it is much better to have the routine compiled into the 
server. Spawning other executables on demand is a flakey business at the best of 
times. Spawning shell processes under UNIX is a nightmare.

The problem is that people like having enough rope to hang themselves with. An
analogous "feature" is the idea that someone posts every so often showing how 
one can add csh into a mailcap file and automaticaly execute Web pages as they 
arrive. I don't think thats a very good idea with a signed, authenticated 
service. Someday someone will load a shell script writen for Mupux-4.2.1(b) not 
realising that their machine is now running <upux-4.2.2(f)patch levelIV. As a 
result of this incompatibility the command rm -Rf / will be executed by 
accident.

See the UNIX=Haters guide for the best summary of UNIX related risks. 


		Phill H-B




home help back first fref pref prev next nref lref last post