On Fri, 26 Sep 2014 09:40:17 +1000 Steven D'Aprano <steve at pearwood.info> wrote: > Perhaps I'm missing something, but aren't there easier ways to attack > os.system than the bash env vulnerability? If I'm accepting and running > arbitrary strings from an untrusted user, there's no need for them to go > to the trouble of feeding me: > > "env x='() { :;}; echo gotcha' bash -c 'echo do something useful'" > > when they can just feed me: > > "echo gotcha" > > In other words, os.system is *already* an attack vector, unless you only > use it with trusted strings. I don't think the bash env vulnerability > adds to the attack surface. > > Have I missed something? The part where the attack payload is passed through the environment, not through hypothetical user-injected command-line arguments. Regards Antoine.
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4