On 4/27/2004 11:34 PM, Jason Dusek wrote:

In the course of a war hacking, I found out that one of my friend's computers did no input validation for a search script - I could put whole perl regular expressions in it as input. Is this an exploitable vulnerability? What can you run inside of m// to get information about someone else's system?

Anything. Anything perl can execute:


perl -e '/@{[print `dir`]}/'



--
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]
<http://learn.perl.org/> <http://learn.perl.org/first-response>




Reply via email to