[28874] in bugtraq
RE: Security bug in CGI::Lite::escape_dangerous_chars() function
daemon@ATHENA.MIT.EDU (Hard Coder)
Thu Feb 13 16:35:45 2003
Message-ID: <20030213075517.29606.qmail@web11105.mail.yahoo.com>
Date: Wed, 12 Feb 2003 23:55:17 -0800 (PST)
From: Hard Coder <hcoder@yahoo.com>
To: bugtraq@securityfocus.com
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Hello Ronald and all others
You might be correct with the issue of
escape_dangerous_chars but instead of the technic you
showed
>>open (SM, "|/usr/sbin/sendmail -f rfg $recipient");
I would use
open(SM, "|/usr/sbin/sendmail -oi -t") || die
"sendmail";
...
print SM "To: $recipient\n";
I think an attacker may cause less harm with this
approach even if escape_dangerous_chars is buggy.
HC
__________________________________________________
Do you Yahoo!?
Yahoo! Shopping - Send Flowers for Valentine's Day
http://shopping.yahoo.com