Beefy Boxes and Bandwidth Generously Provided by pair Networks
Just another Perl shrine
 
PerlMonks  

Re: Re: Errors in my (simple?) CGI Script!

by shotgunefx (Parson)
on Mar 09, 2002 at 21:46 UTC ( [id://150619]=note: print w/replies, xml ) Need Help??


in reply to Re: Errors in my (simple?) CGI Script!
in thread Errors in my (simple?) CGI Script!

I agree with most of your points but why would he untaint progid? It's not passed to any system calls and doesn't appear to be used anywhere but the if statements which is harmless.

-Lee

"To be civilized is to deny one's nature."

Replies are listed 'Best First'.
Why use taint
by simon.proctor (Vicar) on Mar 09, 2002 at 22:22 UTC
    Well for a start its coming from the outside world. In my opinion all CGI programs should be able to run under taint mode before they get put onto a live server. All incoming data must be taint checked before being used. In this case we expect a string so we can strip everything that isn't and so remove all the nasty shell characters and \00.

    In the context of the program above it might appear overkill but arguably its better to get into good habits early.

      I'm not sure why you are asserting that all parameters must specifically be untainted. I would tend to agree with Juerd that unless you're using it in a system call, it doesn't pose a security problem. (theguvnor would welcome any enlightenment to the contrary).

      On the other hand, I don't understand Juerd's assertion that Perl's tainting is such a problem.

      1. You don't have to run -T if you don't want.
      2. Even when you use it, you only have to untaint those variables that you want to use in system calls.

      So I don't know why Juerd is so down on Perl's tainting mechanism...

      ..Guv

        I think in fairness I was neither asserting or insisting someone use taint. Rather I was expressing that it could be used and voicing a personal opinion that it should. If it wasn't clear enough that it was a matter of opinion only then apologies for any confusion caused.

      A reply falls below the community's threshold of quality. You may see it by logging in.

      All incoming data must be taint checked before being used.

      I disagree.

      Only data that is used in external calls must be taint checked. For example, when a name is put in a cookie, just for fun, there's absolutely no reason to taint check it (you should think about encoding it, though).

      I dislike Perl's tainting, because it lets _all_ external input be tainted (and that decreases performance), while some things are never used in a dangerous environment. While it might be a good idea for beginners to always taint everything, I personally HATE -T, and would rather be able to have a lexical taint pragma, and taint and untaint functions for those moments where you want to have a check on some data, or when you know some data is completely safe.

      44696420796F7520732F2F2F65206F
      7220756E7061636B3F202F6D736720
      6D6521203A29202D2D204A75657264
      

        While not as absolute as a taint pragma, the Taint module offers the ability to introduce taint checkpoints in your code. For example:

        use Taint; warn "Oops" if tainted $num, @ids; kill $num, @ids;

        While not as encompassing as a taint pragma, these checkpoints, if placed correctly can tighten up your code without invoking the entire script with the -T. The use of this module however does require some forethought and understanding of tainted data and identification of vunerable execution points within your code.

         

        perl -e 's&&rob@cowsnet.com.au&&&split/[@.]/&&s&.com.&_&&&print'

        Only data that is used in external calls must be taint checked. For example, when a name is put in a cookie, just for fun, there's absolutely no reason to taint check it
        Absolutely no reason to taint check? What if the name they give you contains "\r\n"? If you blindly copied that name into a Set-Cookie header, someone could insert arbitrary HTTP headers and HTML content into your output with a cross-site scripting attack.
        you should think about encoding it, though
        Encoding will solve this problem in most cases. CGI.pm automatically url-escapes cookie contents, which is yet another reason to always use it.
      Personally I don't use taint. Whenever I do anything that could touch the outside I treat it like a bomb. (With great care.) But for someone less familiar with the dangers, It can't hurt. Though it might not help either unless they understand why they are doing and what is dangerous.

      -Lee

      "To be civilized is to deny one's nature."

Log In?
Username:
Password:

What's my password?
Create A New User
Domain Nodelet?
Node Status?
node history
Node Type: note [id://150619]
help
Chatterbox?
and the web crawler heard nothing...

How do I use this?Last hourOther CB clients
Other Users?
Others having an uproarious good time at the Monastery: (5)
As of 2024-03-19 09:45 GMT
Sections?
Information?
Find Nodes?
Leftovers?
    Voting Booth?

    No recent polls found