cannot be exploited
Depends on what you mean, I guess.. Check out the perldoc, and look at the %n format. You can set values.
%n special: *stores* the number of characters output so far
into the next variable in the parameter list
Suppose I have the following code:
my $name = ...; ## from user input
my $amount = ...;
printf "$name : \$%.02f\n", $amount;
# instead of
# printf "%s : \$%.02f\n", $name, $amount;
Now, if a clever hacker goes in and inputs
$name = (" " x 5000) . "%n";
then after the code runs, $amount will be set to 5000. This is a pretty rare set of circumstances, but still something to watch out for.
Update: see also Re: $#="%c"; possible bug
Posts are HTML formatted. Put <p> </p> tags around your paragraphs. Put <code> </code> tags around your code and data!
Read Where should I post X? if you're not absolutely sure you're posting in the right place.
Please read these before you post! —
Posts may use any of the Perl Monks Approved HTML tags:
Outside of code tags, you may need to use entities for some characters:
- a, abbr, b, big, blockquote, br, caption, center, col, colgroup, dd, del, div, dl, dt, em, font, h1, h2, h3, h4, h5, h6, hr, i, ins, li, ol, p, pre, readmore, small, span, spoiler, strike, strong, sub, sup, table, tbody, td, tfoot, th, thead, tr, tt, u, ul, wbr
Link using PerlMonks shortcuts! What shortcuts can I use for linking?
See Writeup Formatting Tips and other pages linked from there for more info.
| & || & |
| < || < |
| > || > |
| [ || [ |
| ] || ] ||