OSEC

Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email hr@neohapsis.com
Bugtraq archives for 4th quarter (Oct-Dec) 1998: Re: Several new CGI vulnerabilities

Re: Several new CGI vulnerabilities

Randal Schwartz (merlynSTONEHENGE.COM)
Mon, 9 Nov 1998 19:45:28 -0700

>>>>> "xnec" == xnec  <xnecWINTERMUTE.LINUX.TC> writes:

xnec> Either fork your sendmail process, strip out metacharacters (or
xnec> only allow certian characters),

You cannot restrict the permitted characters of an email address.
*Any* character is permitted on the left-side of an , presuming
the proper quoting is used for those more odd ones.

For example, <fred&barneystonehenge.com> is a perfectly valid
email address (try it, an autoresponder responds!).

xnec>  use open (MAIL , "|$sendmail -t") or rm -rf
xnec> ./cgi-bin.

Or use Net::SMTP to pass the data directly to port 25.

--
Name: Randal L. Schwartz / Stonehenge Consulting Services (503)777-0095
Keywords: Perl training, UNIX[tm] consulting, video production, skiing, flying
Email: <merlynstonehenge.com> Snail: (Call) PGP-Key: (finger merlynteleport.com)
Web: <A HREF="http://www.stonehenge.com/merlyn/">My Home Page!</A>
Quote: "I'm telling you, if I could have five lines in my .sig, I would!" -- me