I seem to recall some info from yesterday that the example on escape
to shell that's in the PHP book is vulnerable.

How many PHP pages out there are hacked version of the samples in the
PHP book(s)?

How many sites out there have "status", "debug" and learning apps that
escape to shell, and no one realizes they even have that?

Let's not forget all the embedded devices with web sites that escape to shell.

This one is going to have a very long tail...

On Fri, Sep 26, 2014 at 9:05 AM, Brandon Allbery <allber...@gmail.com> wrote:
> On Fri, Sep 26, 2014 at 11:59 AM, Doug Hughes <d...@will.to> wrote:
>>
>> If the CGI in question is bash, this by itself is sufficient to get it to
>> execute code that it otherwise should not have.
>
>
> Or if the CGI is executed by a mechanism which involves /bin/sh, *and*
> /bin/sh is bash. In this case, the language the CGI itself is written in is
> irrelevant.
>
> --
> brandon s allbery kf8nh                               sine nomine associates
> allber...@gmail.com                                  ballb...@sinenomine.net
> unix, openafs, kerberos, infrastructure, xmonad        http://sinenomine.net
>
> _______________________________________________
> Tech mailing list
> Tech@lists.lopsa.org
> https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
> This list provided by the League of Professional System Administrators
>  http://lopsa.org/
>
_______________________________________________
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to