At 01:39 PM 07/30/2001 -0700, [EMAIL PROTECTED] wrote:
>> "Stephen P. Potter" <[EMAIL PROTECTED]> said:
>
>> | 
>> |          open (MAIL, "|/usr/sbin/sendmail $email")
>> | 
>> | to which you should by the way add
>> | 
>> |          or die "sendmail: $!\n";
>> 
>> This probably does not do what you think it does.  It is almost always
>> worthless to check the status of a pipe.  The only time the pipe will fail

Not to mention the fact that that open() call is a bigass security
vulnerability waiting to be exploited. What if the user-supplied value of
$email was something like ";rm -rf ."  ? Not good.

You should really be using sendmail with the -t flag to avoid shell
exploits like this. 

Aloha,
mel
--
mel matsuoka                      Hawaiian Image Productions
Chief Executive Alphageek                (vox)1.808.531.5474
[EMAIL PROTECTED]                    (fax)1.808.526.4040
                     

-- 
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to