FAQ 9.14 How do I make sure users can't enter values into a form that cause my CGI script to do bad

P

PerlFAQ Server

This is an excerpt from the latest version perlfaq9.pod, which
comes with the standard Perl distribution. These postings aim to
reduce the number of repeated questions as well as allow the community
to review and update the answers. The latest version of the complete
perlfaq is at http://faq.perl.org .

--------------------------------------------------------------------

9.14: How do I make sure users can't enter values into a form that cause my CGI script to do bad things?

(contributed by brian d foy)

You can't really prevent people from sending your script bad data, at
least not with Perl, which works on the server side. If you want to
prevent data that try to use SQL injection or other sorts of attacks
(and you should want to), you have to not trust any data that enter your
program.

The perlsec documentation has general advice about data security. If you
are using the "DBI" module, use placeholder to fill in data. If you are
running external programs with "system" or "exec", use the list forms.
There are many other precautions that you should take, too many to list
here, and most of them fall under the category of not using any data
that you don't intend to use. Trust no one.



--------------------------------------------------------------------

The perlfaq-workers, a group of volunteers, maintain the perlfaq. They
are not necessarily experts in every domain where Perl might show up,
so please include as much information as possible and relevant in any
corrections. The perlfaq-workers also don't have access to every
operating system or platform, so please include relevant details for
corrections to examples that do not work on particular platforms.
Working code is greatly appreciated.

If you'd like to help maintain the perlfaq, see the details in
perlfaq.pod.
 
D

David Canzi

This is an excerpt from the latest version perlfaq9.pod, which
comes with the standard Perl distribution. These postings aim to
reduce the number of repeated questions as well as allow the community
to review and update the answers. The latest version of the complete
perlfaq is at http://faq.perl.org .

--------------------------------------------------------------------

9.14: How do I make sure users can't enter values into a form that cause
my CGI script to do bad things?

(contributed by brian d foy)

You can't really prevent people from sending your script bad data, at
least not with Perl, which works on the server side. If you want to

I'd suggest shortening the first sentence to something like this:

"You can't really prevent people from sending your script bad data."

The part of the original sentence after the comma suggests that
client side checking would prevent evil users from sending the
server harmful data. It won't.

The word "really" is optional.
 
B

brian d foy

David Canzi said:
I'd suggest shortening the first sentence to something like this:

"You can't really prevent people from sending your script bad data."

That is probably a better idea, although a couple more sentences about
why that's the case is probably warranted too.

Thanks,
 
D

David Canzi

That is probably a better idea, although a couple more sentences about
why that's the case is probably warranted too.

Thanks,

Here's a possible rewrite of the first paragraph:

You can't prevent people from sending your script malicious
input data. You can put client-side input checking code into
the form you send to a remote machine, but you can't make the
remote machine run it. Browsers can be configured to ignore it,
and a Perl script on the remote machine can send you whatever
its author wants it to send. If you want to prevent SQL
injection or other sorts of attacks (and you should want to),
you have to not trust any data that enter your program.
 
B

brian d foy

That is probably a better idea, although a couple more sentences about
why that's the case is probably warranted too.

Here's a possible rewrite of the first paragraph:[/QUOTE]

The fix is already in.

Thanks,
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Members online

Forum statistics

Threads
473,995
Messages
2,570,230
Members
46,818
Latest member
Brigette36

Latest Threads

Top