Beefy Boxes and Bandwidth Generously Provided by pair Networks
"be consistent"
 
PerlMonks  

Re^12: Making Perl Monks a better place for newbies (and others)

by PerlGuy(Tom) (Acolyte)
on Feb 06, 2020 at 06:47 UTC ( [id://11112478]=note: print w/replies, xml ) Need Help??


in reply to Re^11: Making Perl Monks a better place for newbies (and others)
in thread Making Perl Monks a better place for newbies (and others)

This node falls below the community's threshold of quality. You may see it by logging in.
  • Comment on Re^12: Making Perl Monks a better place for newbies (and others)

Replies are listed 'Best First'.
Re^13: Making Perl Monks a better place for newbies (and others)
by Your Mother (Archbishop) on Feb 06, 2020 at 08:10 UTC

    Why don’t you explain how it is a huge security hole?

      Don't you think answering questions with questions is a rather old troll trick?

      ;P

      (Update: Meta sarcasm)

      Cheers Rolf
      (addicted to the Perl Programming Language :)
      Wikisyntax for the Monastery FootballPerl is like chess, only without the dice

    A reply falls below the community's threshold of quality. You may see it by logging in.
Re^13:Making Perl Monks a better place for newbies (and others)
by jdporter (Paladin) on Feb 06, 2020 at 13:49 UTC
    Isn't that a HUGE security hole?

    It's obvious to me that it isn't, but since it isn't obvious to you, perhaps you'd like to elaborate.

    And anyway, how would replacing newlines with <p> tags mitigate this "security hole"?

Re^13: Making Perl Monks a better place for newbies (and others)
by talexb (Chancellor) on Feb 06, 2020 at 17:31 UTC
      "What the PM engine receives is what the user typed into the box. What is stored in the db is what the user typed into the box."

    I'm not sure I understand how storing user input in the database creates a security issue. If it's code that could run, someone would have to grab that node and .. execute it. The Everything2 engine just stores the user input, then regurgitates it when a node is displayed. The content is never executed by the engine, or by the browser.

    Do you have a proof of concept node that exploits this?

    Alex / talexb / Toronto

    Thanks PJ. We owe you so much. Groklaw -- RIP -- 2003 to 2013.

      Theoretically you could inject XSS code into the user's page or execute other JS exploits.

      You could also damage the display of framing pages with corrupted HTML. (more a nuisance)

      But the posts are filtered and only approved markup is allowed.

      Our new pmdev hasn't even read the user docu below each post form.

      -> Markup in the Monastery -> Perl Monks Approved HTML tags

      Cheers Rolf
      (addicted to the Perl Programming Language :)
      Wikisyntax for the Monastery FootballPerl is like chess, only without the dice

Log In?
Username:
Password:

What's my password?
Create A New User
Domain Nodelet?
Node Status?
node history
Node Type: note [id://11112478]
help
Chatterbox?
and the web crawler heard nothing...

How do I use this?Last hourOther CB clients
Other Users?
Others avoiding work at the Monastery: (3)
As of 2024-04-19 18:07 GMT
Sections?
Information?
Find Nodes?
Leftovers?
    Voting Booth?

    No recent polls found