> ChangeLog, 4.93 :- > > JH/32 > Introduce a general tainting mechanism for values read from the input > channel, and values derived from them. Refuse to expand any tainted > values, to catch one form of exploit.
Ok, so the problem was not in Sieve operation itself, but in the fact that a Sieve script was read (expanded) from a path that contained $local_part? If so, why was the script executed? What's the suggested way to do that for virtual domains, that is many mailboxes that all belong to the same local user, and which are not obtained through a lookup, but through the filesystem itself? Michael -- ## List details at https://lists.exim.org/mailman/listinfo/exim-users ## Exim details at http://www.exim.org/ ## Please use the Wiki with this list - http://wiki.exim.org/
