On Fri, 27 Aug 2004, Atanas wrote:

> http://mimedefang.asd.aplus.net

Pretty cool.  However, using user-supplied data to construct
filenames worries me slightly.  I can imagine an attacker
doing something like:

MAIL FROM:<foo///../../../../../../../../etc/[EMAIL PROTECTED]>

I can't see any way to really exploit this, given that MIMEDefang should
be running as the "defang" user, but still... I would sanitize the incoming
e-mail addresses, or better yet, use a SHA1 hash rather than the actual
address.

--
David.
_______________________________________________
Visit http://www.mimedefang.org and http://www.canit.ca
MIMEDefang mailing list
[EMAIL PROTECTED]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang

Reply via email to