[8477] in bugtraq
Re: Several new CGI vulnerabilities
daemon@ATHENA.MIT.EDU (Gus)
Tue Nov 10 13:49:25 1998
Date: Tue, 10 Nov 1998 14:44:23 +0000
Reply-To: Gus <angus@INTASYS.COM>
From: Gus <angus@INTASYS.COM>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To: <199811100026.SAA26763@wintermute.linux.tc>
On Mon, 9 Nov 1998, xnec wrote:
>
> EXPLOIT:
>
> Each of these are exploitable by inputing metacharacters into the
> recipient's email address. Each script calls something similar
> to:
>
> open( MAIL, "|$mailprog $email" )
This is one that just won't go away, and rather than try the (frankly
quite fruitless) metachar filtering route, it might be an idea for CGI
providing ISP's to insist on the use of perl's Mail::Sendmail module,
which cuts out any potential pipe/metachar related bugs by communicating
directly w/ the SMTP server.
$LOCAL_CPAN_MIRROR/authors/id/M/MI/MIVKOVIC/Mail-Sendmail-0.74.tar.gz
See http://www.perl.com/CPAN for a list of mirror sites.
Regards
Gus
--
angus@intasys.com
http://www.intasys.com/~angus/