Beefy Boxes and Bandwidth Generously Provided by pair Networks
good chemistry is complicated,
and a little bit messy -LW

Re: How safe is my perl cgi website?

by tstock (Curate)
on Jul 05, 2004 at 19:27 UTC ( #371963=note: print w/replies, xml ) Need Help??

in reply to How safe is my perl cgi website?

It's not too hard to test for command injection, SQL injection or cross site scripting "potential". As to actually being able to exploit the vulnerability, that probably depends on the penetration tester experience. You're better safe than sorry, don't depend on "security through obscurity" and cross your "t"s, dot your "i"s.

  • use taint mode
  • sanitize your external inputs and accept only what you expect to get (numbers, strings, specific sizes, etc)
  • use placeholders for SQL values
  • use system(), exec() in list context
  • have your design and code reviewed by a peer
  • implement good audit logs and backups (update)


Log In?

What's my password?
Create A New User
Node Status?
node history
Node Type: note [id://371963]
Jar. Jar!...

How do I use this? | Other CB clients
Other Users?
Others pondering the Monastery: (8)
As of 2018-03-19 16:41 GMT
Find Nodes?
    Voting Booth?
    When I think of a mole I think of:

    Results (244 votes). Check out past polls.