Tim Gim Yee wrote:
> 
> Then root goes into this directory tree and runs a nifty sysadmin tool
> written in Perl+Inline.  If Inline evals the content of the config file
> based off the current directory, blackhat suddenly has root access.
> 
> I think this is the same reason -T removes '.' from @INC.

Tim,

Hmmm. That's very interesting. I suppose hand parsing is the safest, but
I still think I'd like to avoid that. Maybe some sanity checks before
evaling would be sufficient.

- No backticks
- File size limit
etc

I'd like to think about it some more, but I'd welcome more suggestions.

Thanks, Brian

-- 
perl -le 'use Inline C=>q{SV*JAxH(char*x){return newSVpvf
("Just Another %s Hacker",x);}};print JAxH+Perl'

Reply via email to