[4332] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: Perl System Call HACKS

daemon@ATHENA.MIT.EDU (Adam Shostack)
Mon Feb 10 21:31:49 1997

From: Adam Shostack <adam@homeport.org>
In-Reply-To: <9702100746.ZM23110@sgiserv3.aws.waii.com> from Jeff Middleton at "Feb 10, 97 07:46:20 am"
To: jeffm@sgiserv3.aws.waii.com (Jeff Middleton)
Date: Mon, 10 Feb 1997 18:47:12 -0500 (EST)
Cc: www-security@ns2.rutgers.edu
Errors-To: owner-www-security@ns2.rutgers.edu

Don't use system, use exec.

Call 'sendmail -oi -t'.
(Oi ignores dots in the body of the message, -t takes all headers
from the data stream.)

Don't accept user data for *any* header variable.

Don't look for maliciousness, look for things you know are good.

Adam


Jeff Middleton wrote:
| Is there a FAQ or information giving some examples as to the way
| a perl script that executes sendmail via a PERL system call can
| be hacked?
| 
| What strings are going to be malicious to the sendmail execution?
| Is there a work-around?
| 
| You may eMail me directly at jeff.middleton@waii.com.
| 
| Thanks in advance.
| 


-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume



home help back first fref pref prev next nref lref last post