On 06/27/18 11:45, Abdur-Rahmaan Janhangeer wrote:
and that closes it,

thanks !!!

Abdur-Rahmaan Janhangeer
https://github.com/Abdur-rahmaanJ

Importing variables from a file is dangerous because it can execute
arbitrary code.  It should never be done with files provided by the
user.

Using configparser is far, far safer.


  It seems a bit silly to me to worry about arbitrary code execution in an interpreted language like Python whose default runtime execution method is to parse the source code directly.  An attacker would be far more likely to simply modify the source to achieve his ends rather than try to inject a payload externally.

These days, "execute arbitrary code" implies a deliberate attack. Now, if you used input validation as an argument, I would agree that configparser is, if not safer, easier.

-Jim

--
https://mail.python.org/mailman/listinfo/python-list

Reply via email to