Local root vulnerability in snap-confine
Local root vulnerability in snap-confine
Posted Feb 20, 2022 3:03 UTC (Sun) by foom (subscriber, #14868)In reply to: Local root vulnerability in snap-confine by epa
Parent article: Local root vulnerability in snap-confine
If there's blame to be had, it'd be for the Unix shell language which treats strings in a variable unsafely by default!
Posted Feb 21, 2022 7:01 UTC (Mon)
by epa (subscriber, #39769)
[Link] (5 responses)
On some platforms space is not a legal character in filenames but you can use non-breaking space, which isn’t treated specially by the shell. I’m not sure whether that is better or worse.
Posted Feb 21, 2022 12:43 UTC (Mon)
by zdzichu (subscriber, #17118)
[Link] (4 responses)
Posted Feb 21, 2022 13:37 UTC (Mon)
by adobriyan (subscriber, #30858)
[Link] (3 responses)
'-' is allowed in URLs. Any site issuing randomised names (like: YT) to user submitted content will create a file starting with minus easily.
Posted Feb 21, 2022 14:15 UTC (Mon)
by zdzichu (subscriber, #17118)
[Link] (2 responses)
Posted Feb 21, 2022 17:33 UTC (Mon)
by adobriyan (subscriber, #30858)
[Link] (1 responses)
GNU ls(1) started to quote filenames with spaces at some point, it was huge step in right direction because copy paste suddenly started working "out of the box". More features lke this are necessary.
Posted Feb 21, 2022 18:04 UTC (Mon)
by Cyberax (✭ supporter ✭, #52523)
[Link]
Just add automatic escaping for such names.
Local root vulnerability in snap-confine
Local root vulnerability in snap-confine
Local root vulnerability in snap-confine
Everything except NULL and / is allowed in filenames. But it doesn't mean it's a good idea to use it. Please take time to read the essay, it is eye-opening.
Local root vulnerability in snap-confine
And you do not need a website. Just touch -- --foot-shooter
(or touch -- -rf\ .
if you like).
Local root vulnerability in snap-confine
Local root vulnerability in snap-confine