[8477] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Several new CGI vulnerabilities

daemon@ATHENA.MIT.EDU (Gus)
Tue Nov 10 13:49:25 1998

Date: 	Tue, 10 Nov 1998 14:44:23 +0000
Reply-To: Gus <angus@INTASYS.COM>
From: Gus <angus@INTASYS.COM>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <199811100026.SAA26763@wintermute.linux.tc>

On Mon, 9 Nov 1998, xnec wrote:
>
> EXPLOIT:
>
> Each of these are exploitable by inputing metacharacters into the
> recipient's email address.  Each script calls something similar
> to:
>
>  open( MAIL, "|$mailprog $email" )

This is one that just won't go away, and rather than try the (frankly
quite fruitless) metachar filtering route, it might be an idea for CGI
providing ISP's to insist on the use of perl's Mail::Sendmail module,
which cuts out any potential pipe/metachar related bugs by communicating
directly w/ the SMTP server.


$LOCAL_CPAN_MIRROR/authors/id/M/MI/MIVKOVIC/Mail-Sendmail-0.74.tar.gz

See http://www.perl.com/CPAN for a list of mirror sites.


Regards
        Gus


--
                                angus@intasys.com
                          http://www.intasys.com/~angus/

home help back first fref pref prev next nref lref last post