[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: LYNX-DEV using /../ in lynxexec:
From: |
Foteos Macrides |
Subject: |
Re: LYNX-DEV using /../ in lynxexec: |
Date: |
Thu, 16 Jan 1997 23:15:41 -0500 (EST) |
address@hidden wrote:
> When using the TRUSTED_EXEC entry in the cfg file, it seems to be
>possible to bypass security using the /../ notation, as in:
>
>lynxexec:/lynx/bin/../../usr/bin/sh
>
>I removed the problem on our system by searching for "/../" in LYGetFile.c
>as it validate a lynxexec command, but it is rather ugly. Any one have an
>easier way?
I added code to deal with that on 12-16-96, so it's not yet
in Hiram's Composite or the lynxRP code set.
> Oh, and does anyone have a way to prevent a url of file:/
>from being executed? Something similar to a ROOTFILE parameter/
I'm not sure what you mean by "executed". Lynx will expand
that to file://localhost/ and treat it as request for a directory
listing of the root on Unix or of the account's home directory on
VMS.
Fote
=========================================================================
Foteos Macrides Worcester Foundation for Biomedical Research
address@hidden 222 Maple Avenue, Shrewsbury, MA 01545
=========================================================================
;
; To UNSUBSCRIBE: Send a mail message to address@hidden
; with "unsubscribe lynx-dev" (without the
; quotation marks) on a line by itself.
;