summaryrefslogtreecommitdiff
path: root/pod/perlsec.pod
diff options
context:
space:
mode:
authorJarkko Hietaniemi <jhi@iki.fi>2000-03-18 19:56:12 +0000
committerJarkko Hietaniemi <jhi@iki.fi>2000-03-18 19:56:12 +0000
commit4602f195a9a943db1cd284ff4af1bcdb58f98ead (patch)
tree318b2ecd0c5ff35fe7c75032292774679bcd1f36 /pod/perlsec.pod
parentb448e4fea9d52c651a1814ffb2d1d8745f1f0de9 (diff)
downloadperl-4602f195a9a943db1cd284ff4af1bcdb58f98ead.tar.gz
Taint the shell from the getpw*.
p4raw-id: //depot/cfgperl@5805
Diffstat (limited to 'pod/perlsec.pod')
-rw-r--r--pod/perlsec.pod21
1 files changed, 11 insertions, 10 deletions
diff --git a/pod/perlsec.pod b/pod/perlsec.pod
index 40374870a1..e61316511c 100644
--- a/pod/perlsec.pod
+++ b/pod/perlsec.pod
@@ -33,16 +33,17 @@ You may not use data derived from outside your program to affect
something else outside your program--at least, not by accident. All
command line arguments, environment variables, locale information (see
L<perllocale>), results of certain system calls (readdir, readlink,
-the gecos field of getpw* calls), and all file input are marked as
-"tainted". Tainted data may not be used directly or indirectly in any
-command that invokes a sub-shell, nor in any command that modifies
-files, directories, or processes. (B<Important exception>: If you pass
-a list of arguments to either C<system> or C<exec>, the elements of
-that list are B<NOT> checked for taintedness.) Any variable set
-to a value derived from tainted data will itself be tainted,
-even if it is logically impossible for the tainted data
-to alter the variable. Because taintedness is associated with each
-scalar value, some elements of an array can be tainted and others not.
+the gecos and shell fields of getpw* calls), and all file input are
+marked as "tainted". Tainted data may not be used directly or
+indirectly in any command that invokes a sub-shell, nor in any command
+that modifies files, directories, or processes. (B<Important
+exception>: If you pass a list of arguments to either C<system> or
+C<exec>, the elements of that list are B<NOT> checked for
+taintedness.) Any variable set to a value derived from tainted data
+will itself be tainted, even if it is logically impossible for the
+tainted data to alter the variable. Because taintedness is associated
+with each scalar value, some elements of an array can be tainted and
+others not.
For example: