[4373] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: Perl System Call HACKS

daemon@ATHENA.MIT.EDU (Paul Phillips)
Tue Feb 11 22:11:08 1997

Date: Tue, 11 Feb 1997 15:51:14 -0800 (PST)
From: Paul Phillips <paulp@go2net.com>
To: "Brian W. Spolarich" <briansp@ans.net>
cc: Jeff Middleton <jeffm@sgiserv3.aws.waii.com>, www-security@ns2.rutgers.edu
In-Reply-To: <Pine.GSO.3.95.970210164757.3837H-100000@thebrain.aa.ans.net>
Errors-To: owner-www-security@ns2.rutgers.edu



On Mon, 10 Feb 1997, Brian W. Spolarich wrote:

> | Is there a FAQ or information giving some examples as to the way
> | a perl script that executes sendmail via a PERL system call can
> | be hacked?
> 
>   I'd start with the WWW Security FAQ
> 
>   http://www-genome.wi.mit.edu/WWW/faqs/www-security-faq.html
> 
>   especially sections 6 (CGI scripts) and 7 (Safe Scripting in Perl).

There is also the (admittedly somewhat dated) CGI Security page at

  <URL:http://www.go2net.com/people/paulp/cgi-security/>

which has examples and identifies wise and unwise practices.

-- 
Paul Phillips      | Wacky calculator fun for kids: enter your current
Cat Juggler        | age.  Now add 1.  The result is the age you will be
<paulp@go2net.com> | when you die.
+1 206 447 1595    | 


home help back first fref pref prev next nref lref last post