Beefy Boxes and Bandwidth Generously Provided by pair Networks
Think about Loose Coupling

Re: How safe is my perl cgi website?

by tstock (Curate)
on Jul 05, 2004 at 19:27 UTC ( #371963=note: print w/replies, xml ) Need Help??

in reply to How safe is my perl cgi website?

It's not too hard to test for command injection, SQL injection or cross site scripting "potential". As to actually being able to exploit the vulnerability, that probably depends on the penetration tester experience. You're better safe than sorry, don't depend on "security through obscurity" and cross your "t"s, dot your "i"s.

  • use taint mode
  • sanitize your external inputs and accept only what you expect to get (numbers, strings, specific sizes, etc)
  • use placeholders for SQL values
  • use system(), exec() in list context
  • have your design and code reviewed by a peer
  • implement good audit logs and backups (update)


Log In?

What's my password?
Create A New User
Node Status?
node history
Node Type: note [id://371963]
and all is quiet...

How do I use this? | Other CB clients
Other Users?
Others chanting in the Monastery: (13)
As of 2017-12-14 13:46 GMT
Find Nodes?
    Voting Booth?
    What programming language do you hate the most?

    Results (394 votes). Check out past polls.