start page | rating of books | rating of authors | reviews | copyrights

Perl Cookbook

Perl CookbookSearch this book
Previous: 19.5. Making CGI Scripts Efficient Chapter 19
CGI Programming
Next: 19.7. Formatting Lists and Tables with HTML Shortcuts
 

19.6. Executing Commands Without Shell Escapes

Problem

You need to use a user's input as part of a command, but you don't want to allow the user to make the shell run other commands or look at other files. If you just blindly call the system function or backticks on a single string containing a command line, the shell might be used to run the command. This would be unsafe.

Solution

Unlike its single-argument version, the list form of the system function is safe from shell escapes. When the command's arguments involve user input from a form, never use this:

system("command $input @files");            # UNSAFE

Write it this way instead:

system("command", $input, @files);          # safer

Discussion

Because Perl was designed as a glue language, it's easy to use it to call other programs  - too easy, in some cases.

If you're merely trying to run a shell command but don't need to capture its output, it's easy enough to call system using its multiple argument form. But what happens if you're using the command in backticks or as part of a piped open? Now you have a real problem, because those don't permit the multiple argument form that system does. The solution is to manually fork and exec the child processes on your own. It's more work, but at least stray shell escapes won't be ruining your day.

It's safe to use backticks in a CGI script only if the arguments you give the program are purely internally generated, as in:

chomp($now = `date`);

But if the command within the backticks contains user-supplied input, perhaps like this:

@output = `grep $input @files`;

you have to be much more careful.

die "cannot fork: $!" unless defined ($pid = open(SAFE_KID, "|-")); if ($pid == 0) {     exec('grep', $input, @files) or die "can't exec grep: $!"; } else {     @output = <SAFE_KID>;     close SAFE_KID;                 # $? contains status }

This works because exec , like system , permits a calling convention that's proof against shell escapes. When passed a list, no shell is called, and so no escapes can occur.

Similar circumlocutions are needed when using open to start up a command. Here's a safe backtick or piped open for read. Instead of using this unsafe code:

open(KID_TO_READ, "$program @options @args |");    # UNSAFE

Use this more complicated but safer code:

# add error processing as above die "cannot fork: $!" unless defined($pid = open(KID_TO_READ, "-|"));  if ($pid) {   # parent    while (<KID_TO_READ>) {        # do something interesting    }    close(KID_TO_READ)               or warn "kid exited $?";  } else {      # child    # reconfigure, then    exec($program, @options, @args)  or die "can't exec program: $!"; }

Here's a safe piped open for writing. Instead of using this unsafe code:

open(KID_TO_WRITE, "|$program $options @args");   # UNSAFE

Use this more complicated but safer code:

$pid = open(KID_TO_WRITE, "|-"); die "cannot fork: $!" unless defined($pid = open(KID_TO_WRITE, "|-")); $SIG{ALRM} = sub { die "whoops, $program pipe broke" };  if ($pid) {  # parent    for (@data) { print KID_TO_WRITE $_ }    close(KID_TO_WRITE)              or warn "kid exited $?";  } else {     # child    # reconfigure, then    exec($program, @options, @args)  or die "can't exec program: $!"; } 

At the point where the comment in the code says reconfigure, then you can put in any extra security measures you'd like. You're in the child process now, where changes won't propagate back to the parent. You can change environment variables, reset temporary user or group ID values, change directories or umasks, etc.

All this doesn't help you, of course, if your system call runs a setuid program that can be exploited with the data you give it. The mail program sendmail is a setuid program commonly run from CGI scripts. Know the risks before you call sendmail or any other setuid program.

See Also

The system , exec , and open functions in Chapter 3 of Programming Perl and in perlfunc (1); the section on "Cooperating with Strangers" in Chapter 6 of Programming Perl ; perlsec (1); Recipe 16.1 ; Recipe 16.2 ; Recipe 16.3


Previous: 19.5. Making CGI Scripts Efficient Perl Cookbook Next: 19.7. Formatting Lists and Tables with HTML Shortcuts
19.5. Making CGI Scripts Efficient Book Index 19.7. Formatting Lists and Tables with HTML Shortcuts

Library Navigation Links

Copyright © 2001 O'Reilly & Associates. All rights reserved.