From: Michael Conrad
> Sent: 03 July 2024 01:29
> 
> The underlying root problem here is the same as SQL injection or HTML
> cross-site scripting attacks.  You have data, and you emit it in a
> context that is expecting a language/protocol of some sort, not raw
> data.  You then need to escape anything in your data that could be
> misinterpreted as the protocol.  We're really lucky that there isn't any
> way to make a TTY execute commands or delete files or grant user
> permissions.

I'm sure some terminals supported an escape sequences to write the
terminal 'answerback' message.
(You might need to back to 1980's async terminals.)

Having 'ls' generate the answerback message (unlikely on anything recent)
is mighty confusing - even when not malicious.

        David

-
Registered Address Lakeside, Bramley Road, Mount Farm, Milton Keynes, MK1 1PT, 
UK
Registration No: 1397386 (Wales)
_______________________________________________
busybox mailing list
busybox@busybox.net
http://lists.busybox.net/mailman/listinfo/busybox

Reply via email to