New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
shell injection in c2ph #14643
Comments
From zefram@fysh.orgCreated by zefram@fysh.org$ /opt/perl/bin/c2ph -n ';echo wibble.c' The program is doing things with the supplied filenames that assume Perl Info
|
From @LeontOn Thu, Apr 9, 2015 at 5:39 PM, Zefram <perlbug-followup@perl.org> wrote:
The author was Tom Christiansen, and I believe he's quite familiar with Leon |
The RT System itself - Status changed from 'new' to 'open' |
Migrated from rt.perl.org#124275 (status was 'open')
Searchable as RT124275$
The text was updated successfully, but these errors were encountered: