Bugtraq mailing list archives
cgi-bin security
From: paulp () CERF NET (Paul Phillips)
Date: Mon, 14 Aug 1995 00:04:57 -0700
From: Lee Silverman <lee () NETSPACE ORG>
Given all the posts here lately about holes in cgi-bin scripts, has anyone come up with a good set of guidelines to tell programs what is and is not acceptable for putting in cgi-bin programs?
I've started something along these lines: <URL:http://www.primus.com/staff/paulp/cgi-security/>
For example, if someone gave you a cgi-bin script and asked you to tell them if it was going to cause any security holes, what would you look for? Paul, what methods have you been using to track all these bugs in freeware cgi-bin packages? (If you don't mind telling us...)
Basically I just track the user input through the script and see how it's handled. Anything that invokes a shell or any other external program is suspect and should be looked at carefully. If it's perl, run it with -T and see if/where it complains about misuse of tainted data. If it's SUID or runs as someone other than nobody, it deserves a fine-tooth comb. -- Paul Phillips | "Click _here_ if you do not <URL:mailto:paulp () cerf net> | have a graphical browser" <URL:http://www.primus.com/staff/paulp/> | -- Canter and Siegel, on <URL:pots://+1-619-220-0850/is/paul/there?> | their short-lived web site
Current thread:
- LPR/LPD bugs Paul Phillips (Jul 31)
