Jorge Aldo G. de F. Junior wrote:

I believe that you already know that, but thats why i asked if others
are considering the security risk involved in filenames.

For evidence sake look at this old IIS bug :

http://www.hackingspirits.com/eth-hac/papers/iis_uni.html

Morale : Filenames can be nasty and filename checking functions tend
to be complex...

The security risk there isn't in the filename per se, but in what it's passed to. You can safely put most characters in a filename, but the result of that must be checked before being passed to a unix shell, to IIS, to ShellExecuteEx() (or whatever the name of the Windows function is) and so on: that's why Perl has the "tainted" concept that allows anything injected by a user to be tracked and treated as potentially hostile.

--
Mark Morgan Lloyd
markMLl .AT. telemetry.co .DOT. uk

[Opinions above are the author's, not those of his employers or colleagues]
_______________________________________________
fpc-pascal maillist  -  fpc-pascal@lists.freepascal.org
http://lists.freepascal.org/mailman/listinfo/fpc-pascal

Reply via email to