Manuel Lemos wrote:
>
> Hello Torsten,
>
> On 04-Sep-00 05:41:02, you wrote:
>
> >> application: PHP interface to ht://Dig 2000.09.03
> >> author: Manuel Lemos <[EMAIL PROTECTED]>
> >> license: freely distributable
> >> category: Web/Development
> >>
> >> homepage: http://freshmeat.net/redir/homepage/968017154/
> >> download: http://freshmeat.net/redir/download/968017154/
>
> >At first glance, I would say that there is a possible security hole
> >in this class since the htsearch parameters are not shell-escapes.
> >This could allow the execution of arbitrary commands.
>
> I'm not sure how that may happen because the search words, eventually
> passed as submitted form values, are URLEncoded and then passed to htsearch
> in the QUERY_STRING environment variable. I wonder if URLEncoding would
> not prevent all possible attacks.
Hmm.. I think it will prevent most possible attacks, but not all.
One reason for this is, that shell-escaping is platform dependant and
therefore
must be handled differently on different OS platforms by the scripting
engine
whereas URLencoding is not platform dependant.
cheers,
Torsten
--
InWise - Wirtschaftlich-Wissenschaftlicher Internet Service GmbH
Waldhofstra�e 14 Tel: +49-4101-403605
D-25474 Ellerbek Fax: +49-4101-403606
E-Mail: [EMAIL PROTECTED] Internet: http://www.inwise.de
------------------------------------
To unsubscribe from the htdig mailing list, send a message to
[EMAIL PROTECTED]
You will receive a message to confirm this.
List archives: <http://www.htdig.org/mail/menu.html>
FAQ: <http://www.htdig.org/FAQ.html>