Re: Vulnerability in websendmail

Randal Schwartz (merlyn@STONEHENGE.COM)
Tue, 08 Jul 1997 07:11:27 -0700

>>>>> "Razvan" == Razvan Dragomirescu <drazvan@kappa.ro> writes:

Razvan> As many other cgi-bin programs, this one does not check for special
Razvan> characters in the user input.

Razvan> Here's what it does:
Razvan> (...)
Razvan> $cmd="| $MAILBIN $VAR_receiver";
Razvan> open (PIPEOUT, $cmd);

It really amazes me how many newbie Perl hackers:
(1) ignore the CGI Security FAQ (especially the parts about perl), or
(2) roll their own mail sending stuff, instead of using Net::SMTP
or the more powerful Mail::Tools package, both found in the CPAN.

On second thought, maybe it's not amazing. :-)

--
Name: Randal L. Schwartz / Stonehenge Consulting Services (503)777-0095
Keywords: Perl training, UNIX[tm] consulting, video production, skiing, flying
Email: <merlyn@stonehenge.com> Snail: (Call) PGP-Key: (finger merlyn@ora.com)
Web: <A HREF="http://www.stonehenge.com/merlyn/">My Home Page!</A>
Quote: "I'm telling you, if I could have five lines in my .sig, I would!" -- me