[28874] in bugtraq

home help back first fref pref prev next nref lref last post

RE: Security bug in CGI::Lite::escape_dangerous_chars() function

daemon@ATHENA.MIT.EDU (Hard Coder)
Thu Feb 13 16:35:45 2003

Message-ID: <20030213075517.29606.qmail@web11105.mail.yahoo.com>
Date: Wed, 12 Feb 2003 23:55:17 -0800 (PST)
From: Hard Coder <hcoder@yahoo.com>
To: bugtraq@securityfocus.com
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii

Hello Ronald and all others

You might be correct with the issue of
escape_dangerous_chars but instead of the technic you
showed

>>open (SM, "|/usr/sbin/sendmail -f rfg $recipient");

I would use

open(SM, "|/usr/sbin/sendmail -oi -t") || die
"sendmail";
...
print SM "To: $recipient\n";

I think an attacker may cause less harm with this
approach even if escape_dangerous_chars is buggy.

HC

__________________________________________________
Do you Yahoo!?
Yahoo! Shopping - Send Flowers for Valentine's Day
http://shopping.yahoo.com

home help back first fref pref prev next nref lref last post