LiangTyan Fui wrote:

It is rather safe to use the "do" command here. I haven't come across any crackers does xTalk, yet ;)

True, but when we take over the world you will change your mind. ;)

It is even safer if you:
set secureMode to true -- all access to file system and other system resources is disabled.
if you don't really need to read/write files.

Good point. Tariel needs to write to files though.


My greater fear are the shell() command and the file path system. If you pipe the parameter directly to the shell() command, you are in great risk. Also, if you would allow the browser end to specify resources thru the path name (like /myfolder/myfile.txt), the risk of exposing other files will be there (cracker may specify something like ../../../known-system-file).

Right. I think if a CGI does that, the author gets what he deserves. For most CGIs that I have seen, people want to do a specific task like this one, writing data to a stack. I don't think there is much danger with that, even if the stack is outside the CGI folder. There are no path parameters involved -- that would be written into the CGI, so hackers wouldn't even know the stack exists or what its file path is. I can't see how it could be hacked.


MetaCard engine is rather safe to use as CGI. Just like php/perl/java. It is the application that opens the loophole. I've got people hacked into my development server via mambo* loophole (developed on php), I can only blame myself on not getting mambo up to date, there is really nothing to do with php and mysql.

Scott Raney talked about this once too. He agreed that MetaCard itself is very safe as long as you don't do anything stupid with it. The engine doesn't allow any misbehavior. To really do bad things, you have to write the capability into your scripts.

--
Jacqueline Landman Gay         |     [EMAIL PROTECTED]
HyperActive Software           |     http://www.hyperactivesw.com
_______________________________________________
metacard mailing list
[email protected]
http://lists.runrev.com/mailman/listinfo/metacard

Reply via email to