Tim Gim Yee wrote:
>
> Then root goes into this directory tree and runs a nifty sysadmin tool
> written in Perl+Inline. If Inline evals the content of the config file
> based off the current directory, blackhat suddenly has root access.
>
> I think this is the same reason -T removes '.' from @INC.
Tim,
Hmmm. That's very interesting. I suppose hand parsing is the safest, but
I still think I'd like to avoid that. Maybe some sanity checks before
evaling would be sufficient.
- No backticks
- File size limit
etc
I'd like to think about it some more, but I'd welcome more suggestions.
Thanks, Brian
--
perl -le 'use Inline C=>q{SV*JAxH(char*x){return newSVpvf
("Just Another %s Hacker",x);}};print JAxH+Perl'