Questions about this topic? Sign up to ask in the talk tab.

Difference between revisions of "Unsafe evaluation"

From NetSec
Jump to: navigation, search
 
Line 7: Line 7:
 
Design around the need to combine the function "eval" with user input.
 
Design around the need to combine the function "eval" with user input.
 
      
 
      
Auditing:
+
=Auditing=
 
{{code|text=<source lang="bash">IGNORECASE=1 find -regextype posix-awk -regex ".*\.(rb|php|pl|py|pm)" -exec grep -HnC2 \\beval\( '{}' \;</source>}}
 
{{code|text=<source lang="bash">IGNORECASE=1 find -regextype posix-awk -regex ".*\.(rb|php|pl|py|pm)" -exec grep -HnC2 \\beval\( '{}' \;</source>}}
  
 
[[Category:Secure programming]]
 
[[Category:Secure programming]]

Latest revision as of 02:56, 12 May 2013

Proof of concept

It is never safe to eval() user input, plain and simple. There is always another way to skin the cat; try and consider that!

Mitigation

Design around the need to combine the function "eval" with user input.

Auditing

IGNORECASE=1 find -regextype posix-awk -regex ".*\.(rb|php|pl|py|pm)" -exec grep -HnC2 \\beval\( '{}' \;