Once upon a time, Marcelo Ricardo Leitner <[email protected]> said:
> You're considering only the escalation way to do it, but there are
> other ways to exploit code laying around, like when some web pages
> don't sanitize the URL enough and end up allowing executing
> something in the system, much like sql injection. In those cases,
> one could craft URLs to run wget or any other tool that may help the
> intruder get even more inside.

Down that path lies madness.  Are you going to remove /bin/sh?  If not,
virtually anything else is possible.

-- 
Chris Adams <[email protected]>
-- 
devel mailing list
[email protected]
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Reply via email to