On Thu, Aug 4, 2005, [EMAIL PROTECTED] said:

> A BUGNOTE has been added to this bug.
> ======================================================================
> http://www.dbmail.org/mantis/bug_view_advanced_page.php?bug_id=0000239
> ======================================================================

[snip]
> I understand "|" may be dangerous on recipient side (maybe interpreted as
> a process pipe), but on sender side? This (MAIL FROM) is used for
> Return-path header only, isn't it?

What we need to test is if this is a problem for ! and | forwards from the
aliases table. We should be shell-escaping the stuff that goes onto those
command lines so that we can handle any input.

*looks at DBMail 2.0 code*

Nope. This may be a problem. At the moment you can't get any nefarious
characters into the system due to validchars, and indeed people *do* set
up their own aliases table using chains of pipes. We don't want to throw
the baby out with the bathwater and disable administrator-specified
pipes... so we can't just quote everything blindly.

Before we add | to validchars, we need to double check that all paths
between the incoming address and the popen() call are vetted through the
aliases table and are explicitly allowed if they contain anything
interesting. In particular, I'm thinking that we might need extra checks
for the domain catch alls.

Aaron

Reply via email to