Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon.

Pages: 1-

Perl - Considered Harmful

Name: Anonymous 2007-09-26 11:57 ID:PVPJIMeO

Name: Anonymous 2007-09-26 12:08 ID:BdfLNWna

That's what happens when you don't use Haskell.

Name: Anonymous 2007-09-26 12:11 ID:ytIgUPD5

cgi != perl

Name: Anonymous 2007-09-26 12:26 ID:Heaven

Name: Anonymous 2007-09-26 12:37 ID:PVPJIMeO

Aww, that didn't las long. :(

Site Area Temporarily Unavailable

Name: Anonymous 2007-09-26 12:43 ID:0c3Dv2s5

:o

Name: Anonymous 2007-09-26 14:01 ID:x4M7KQnG

Lol "web designers"

Name: Anonymous 2007-09-26 14:03 ID:UNhwycNq

>>3
I'm pretty sure this is related to Perl's string handling. This wasn't just another stupid programmer, everyone could have made this mistake.

Name: Anonymous 2007-09-26 14:08 ID:uxItpmSb

How do we know this is Perl? CGI could be assembly for all we know.

Name: Anonymous 2007-09-26 14:17 ID:x4M7KQnG

>>9
Maybe it's Cfag, writing C and AJAX. Cfag, where are you? Did you have anything to do with this? (I know it's faster, I know, calm down, good boy, I'll let you use -O3 next time.)

Name: Anonymous 2007-09-26 14:34 ID:KL24CKTG

Lesson learned: path handling isn't something you want to do naïvely with string concatenation or interpolation features. Unless you're sure that the things you're concatenating together are single path components and not ".." or ".".

Name: Anonymous 2007-09-26 16:27 ID:UNhwycNq

>>11
The thing you should have learned from this is that you can't be sure, ever.

Name: Anonymous 2007-09-26 20:17 ID:ESJl0kva

Anyone got script's own sauce?

Name: Anonymous 2007-09-26 20:18 ID:LtRNK20g

Someone posted already posted this this morning. Shadow passwd files are useless to an attacker, gtfo script kiddies.

Name: Anonymous 2007-09-27 0:56 ID:ezfub8/2

>>12
That's horseshit. You can be sure, as long as certain conditions hold. Robust code will manage these conditions and then apply the appropriate computation to produce results according to specification.

Name: Anonymous 2007-09-27 5:37 ID:I/UmFjtl

Nobody in his sane mind will use old passwd, so /etc/passwd is nowhere as interesting as it used to be.

Name: Anonymous 2007-09-27 8:15 ID:v/6oeJEL

>>16
Then get /etc/shadow. If they're stupid enough to leave gaping security holes there's a chance they're also running httpd as root.

Name: Anonymous 2007-09-27 8:26 ID:Heaven

>>17
nobody runs httpd as root.

Name: Anonymous 2007-09-27 8:54 ID:Heaven

>>18
root runs httpd as nobody

Name: Anonymous 2007-09-27 9:40 ID:I/UmFjtl

>>19
I see what you did there

Name: Anonymous 2007-09-27 10:03 ID:wZyP+aLB

Actually the code running was PHP, perl CGI and open do not have issues with %00, PHP has and does, especially PHP used as a CGI. You fail it.

Name: Anonymous 2007-09-27 10:22 ID:ZjUATZc2

>>21
Can you elaborate on the %00 thing please?

Name: Anonymous 2007-09-27 10:28 ID:x4Zs8kSb

%00 = poison null byte?

Name: Anonymous 2007-09-27 10:29 ID:x4Zs8kSb

>>23
Hmm.. http://en.wikipedia.org/wiki/Null_character
Typically, `Poison NULL byte` is exploited along with another type of exploit such as Directory traversal...

Name: Anonymous 2007-09-27 11:27 ID:mFFF2Dgr

root runs nobody as an ENTERPRISE LEVEL SOLUTION

Name: Anonymous 2010-11-15 21:01

Name: Anonymous 2010-12-22 4:47

Name: Anonymous 2011-02-02 23:14

Name: Anonymous 2012-06-25 23:05

ग梒鞑蠩ⁱ㠀⎈閑扖茓䡷і〴▕艢隔⠁⒑噱ᖒ靂薇⦑䂑䅱呉䉙ᐒ肖朓鄃どⅲᖑ∦聣㥂䜲፠ኆ昸扩啱䉅蘑℡陳唨薑禇蕨☶允垆慆聲喐䅤͹還墓㞉ᔸ畢朡㚆蠗鈄➐㝦‰♣偓礸ↇ遑㘶蜁⤖遱⎓㈴ᄒ鐑悉䥥吨爙≷膑㝈⠰䦙隗ه܅噳瀱镕攳ᙳ馐ㄲ圡儩㜆䕒傄褆䁳㤅刈㈉恣蚗ぐ怵琓ᠷ〹ࠃख़㄰芐䍗餷ɧ䈷牗攘眘䐩հ䡤錒別吡覘战І榀偷霐⥣⡀陥䅨䍒朒㈣́顶唉餩⌴鞉㙵蝣䀆陦桰⢙隉䄑䈉А蝁䜓䐱蠅砲ᤠ⠀Ԩ蠙獥萧牀ក唆兆吇ृ唵霨蝶ᕂ␠    堳镒鞇錶攁䅣煰Ɛ䅒员猔ᡅ厅阙蠉ĵ⤢⎒㉹㔑蒃䕧暀⦂碈ॉ噓᜖䤉险鄴㞘⁡顂呕爣镑በ䝐暀䘱咗攄䑦ᙙᦖ脔ဉ㊇梖䙓ޘ匕聠ހ蘁荇㔃爐増㌨獁瀰啥暓䝧砤蘐睓脵傘㉃ᔶ掃䄱銁ㅖ䡗ɢħ煥㦉倕灣錉腈卹䖄镨ᘸ啴荒䊁茂瑕ɱՖ࠲䍖ᎂ鉨昸頁㞇‸❑爘靂䈘茸

Don't change these.
Name: Email:
Entire Thread Thread List