Samuel Thibault <sthiba...@debian.org> writes: > Matthias Urlichs, le Thu 25 Sep 2014 21:17:58 +0200, a écrit : >> Samuel Thibault: >> > Sounds crazy to me. >> > >> Definitely. This is now out in the wild; exploits which simply replace >> echo or cat-without-/bin are going to happen. :-/ > > That's not so easy to exploit. You have to manage to inject those precise > variable names.
Wasn't there some web server that used to put query script variables into the environment of the CGI script? Or am I confusing that with PHP's evil register_globals? Best, -Nikolaus -- GPG encrypted emails preferred. Key id: 0xD113FCAC3C4E599F Fingerprint: ED31 791B 2C5C 1613 AF38 8B8A D113 FCAC 3C4E 599F »Time flies like an arrow, fruit flies like a Banana.« -- To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/87oau3mdkv....@vostro.rath.org