Once upon a time, Marcelo Ricardo Leitner <marcelo.leit...@gmail.com> said:
> You're considering only the escalation way to do it, but there are
> other ways to exploit code laying around, like when some web pages
> don't sanitize the URL enough and end up allowing executing
> something in the system, much like sql injection. In those cases,
> one could craft URLs to run wget or any other tool that may help the
> intruder get even more inside.

Down that path lies madness.  Are you going to remove /bin/sh?  If not,
virtually anything else is possible.

-- 
Chris Adams <li...@cmadams.net>
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Reply via email to