M Champion:
> Hi Wietse,
> 
> >> The DB dump shows :
> >>
> >> londonstransport+bncbdzntlposqirbr426sgamgqeh7mv...@googlegroups.com??? 
> >> 0:0:1637682515:250 2.1.5 OK s8si901258edx.4 - gsmtp
> > There are 0xc2 0xa0 bytes at the end of the storage key, but not
> > in your query.
> 
> Apologies,? I pasted the output generated by 'postmap -s' which puts a 
> tab character (9) between key and value. I can't say where the other 
> bytes came from. The extra bytes aren't in the key part of database file 
> hex dump so still at a loss why postmap -q doesn't match :
> 
> 00006860  70 00 34 00 00 00 00 00  45 00 6c 6f 6e 64 6f 6e  |p.4.....E.london|
> 00006870  73 74 72 61 6e 73 70 6f  72 74 2b 62 6e 63 42 44  |stransport+bncBD|
> 00006880  5a 4e 54 4c 50 4f 53 51  49 52 42 52 34 32 36 53  |ZNTLPOSQIRBR426S|
> 00006890  47 41 4d 47 51 45 48 37  4d 56 4b 55 41 40 67 6f  |GAMGQEH7MVKUA@go|
> 000068a0  6f 67 6c 65 67 72 6f 75  70 73 2e 63 6f 6d 00 30  |oglegroups.com.0|

OK, the storage key is null-terminated. you may have to use a postmap option 
to add a null byte to the query.

> > Your postmap queries will have a shell command injection attack
> > of the command is processed by a shell.

> I find your last paragraph worrying. Do you mean my own postmap queries 
> will facilitate an external attack? Or that my queries are the attack?
> I really don't want open any security holes.

perl, python etc can invoke commands as a list, or as a string which
is parsed by a shell. The first form is safe, the other not.

    WietsE

Reply via email to