Beefy Boxes and Bandwidth Generously Provided by pair Networks
Clear questions and runnable code
get the best and fastest answer

Re: How safe is my perl cgi website?

by tstock (Curate)
on Jul 05, 2004 at 19:27 UTC ( #371963=note: print w/ replies, xml ) Need Help??

in reply to How safe is my perl cgi website?

It's not too hard to test for command injection, SQL injection or cross site scripting "potential". As to actually being able to exploit the vulnerability, that probably depends on the penetration tester experience. You're better safe than sorry, don't depend on "security through obscurity" and cross your "t"s, dot your "i"s.

  • use taint mode
  • sanitize your external inputs and accept only what you expect to get (numbers, strings, specific sizes, etc)
  • use placeholders for SQL values
  • use system(), exec() in list context
  • have your design and code reviewed by a peer
  • implement good audit logs and backups (update)


Comment on Re: How safe is my perl cgi website?

Log In?

What's my password?
Create A New User
Node Status?
node history
Node Type: note [id://371963]
and the web crawler heard nothing...

How do I use this? | Other CB clients
Other Users?
Others chanting in the Monastery: (12)
As of 2015-03-06 15:13 GMT
Find Nodes?
    Voting Booth?

    When putting a smiley right before a closing parenthesis, do you:

    Results (167 votes), past polls