Commit | Line | Data |
---|---|---|
d6376244 JH |
1 | /* taint.c |
2 | * | |
663f364b | 3 | * Copyright (C) 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, |
1129b882 | 4 | * 2002, 2003, 2004, 2005, 2006, 2007, 2008 by Larry Wall and others |
d6376244 JH |
5 | * |
6 | * You may distribute under the terms of either the GNU General Public | |
7 | * License or the Artistic License, as specified in the README file. | |
8 | * | |
9 | */ | |
10 | ||
a0d0e21e | 11 | /* |
4ac71550 TC |
12 | * '...we will have peace, when you and all your works have perished--and |
13 | * the works of your dark master to whom you would deliver us. You are a | |
cdad3b53 | 14 | * liar, Saruman, and a corrupter of men's hearts.' --Théoden |
4ac71550 TC |
15 | * |
16 | * [p.580 of _The Lord of the Rings_, III/x: "The Voice of Saruman"] | |
a0d0e21e LW |
17 | */ |
18 | ||
166f8a29 DM |
19 | /* This file contains a few functions for handling data tainting in Perl |
20 | */ | |
21 | ||
463ee0b2 | 22 | #include "EXTERN.h" |
864dbfa3 | 23 | #define PERL_IN_TAINT_C |
463ee0b2 LW |
24 | #include "perl.h" |
25 | ||
26 | void | |
e1c41806 | 27 | Perl_taint_proper(pTHX_ const char *f, const char *const s) |
79072805 | 28 | { |
bc2f1ca1 KW |
29 | /* Output a tainting violation, croaking unless we're just to warn. |
30 | * '_proper' is just to throw you off the scent */ | |
31 | ||
26e623cf | 32 | #if defined(HAS_SETEUID) && defined(DEBUGGING) |
7918f24d NC |
33 | PERL_ARGS_ASSERT_TAINT_PROPER; |
34 | ||
26e623cf | 35 | { |
dfff4baf BF |
36 | const Uid_t uid = PerlProc_getuid(); |
37 | const Uid_t euid = PerlProc_geteuid(); | |
26e623cf | 38 | |
8b225b9c | 39 | #if Uid_t_sign == 1 /* uid_t is unsigned. */ |
8772537c | 40 | DEBUG_u(PerlIO_printf(Perl_debug_log, |
147e3846 | 41 | "%s %d %" UVuf " %" UVuf "\n", |
8b225b9c JH |
42 | s, TAINT_get, (UV)uid, (UV)euid)); |
43 | #else /* uid_t is signed (Uid_t_sign == -1), or don't know. */ | |
44 | DEBUG_u(PerlIO_printf(Perl_debug_log, | |
147e3846 | 45 | "%s %d %" IVdf " %" IVdf "\n", |
8b225b9c JH |
46 | s, TAINT_get, (IV)uid, (IV)euid)); |
47 | #endif | |
26e623cf | 48 | } |
a52cb5f7 | 49 | #endif |
1e422769 | 50 | |
284167a5 | 51 | if (TAINT_get) { |
8772537c AL |
52 | const char *ug; |
53 | ||
22c35a8c GS |
54 | if (!f) |
55 | f = PL_no_security; | |
985213f2 | 56 | if (PerlProc_getuid() != PerlProc_geteuid()) |
bbce6d69 | 57 | ug = " while running setuid"; |
985213f2 | 58 | else if (PerlProc_getgid() != PerlProc_getegid()) |
bbce6d69 | 59 | ug = " while running setgid"; |
284167a5 | 60 | else if (TAINT_WARN_get) |
6537fe72 MS |
61 | ug = " while running with -t switch"; |
62 | else | |
bbce6d69 | 63 | ug = " while running with -T switch"; |
5d37acd6 | 64 | |
6fd06953 | 65 | /* XXX because taint_proper adds extra format args, we can't |
bc2f1ca1 | 66 | * get the caller to check properly; so we just silence the warning |
6fd06953 | 67 | * and hope the callers aren't naughty */ |
7347ee54 | 68 | GCC_DIAG_IGNORE_STMT(-Wformat-nonliteral); |
284167a5 | 69 | if (PL_unsafe || TAINT_WARN_get) { |
9b387841 | 70 | Perl_ck_warner_d(aTHX_ packWARN(WARN_TAINT), f, s, ug); |
6537fe72 MS |
71 | } |
72 | else { | |
73 | Perl_croak(aTHX_ f, s, ug); | |
74 | } | |
7347ee54 | 75 | GCC_DIAG_RESTORE_STMT; |
5d37acd6 | 76 | |
79072805 LW |
77 | } |
78 | } | |
79 | ||
80 | void | |
864dbfa3 | 81 | Perl_taint_env(pTHX) |
79072805 LW |
82 | { |
83 | SV** svp; | |
27da23d5 JH |
84 | const char* const *e; |
85 | static const char* const misc_env[] = { | |
7bac28a0 | 86 | "IFS", /* most shells' inter-field separators */ |
c90c0ff4 | 87 | "CDPATH", /* ksh dain bramage #1 */ |
88 | "ENV", /* ksh dain bramage #2 */ | |
89 | "BASH_ENV", /* bash dain bramage -- I guess it's contagious */ | |
e62a6770 RGS |
90 | #ifdef WIN32 |
91 | "PERL5SHELL", /* used for system() on Windows */ | |
92 | #endif | |
7bac28a0 | 93 | NULL |
94 | }; | |
1e422769 | 95 | |
c038024b RGS |
96 | /* Don't bother if there's no *ENV glob */ |
97 | if (!PL_envgv) | |
142393a6 | 98 | return; |
284167a5 | 99 | /* If there's no %ENV hash or if it's not magical, croak, because |
c038024b RGS |
100 | * it probably doesn't reflect the actual environment */ |
101 | if (!GvHV(PL_envgv) || !(SvRMAGICAL(GvHV(PL_envgv)) | |
daba3364 | 102 | && mg_find((const SV *)GvHV(PL_envgv), PERL_MAGIC_env))) { |
284167a5 | 103 | const bool was_tainted = TAINT_get; |
8772537c | 104 | const char * const name = GvENAME(PL_envgv); |
284167a5 | 105 | TAINT; |
c038024b RGS |
106 | if (strEQ(name,"ENV")) |
107 | /* hash alias */ | |
108 | taint_proper("%%ENV is aliased to %s%s", "another variable"); | |
109 | else | |
110 | /* glob alias: report it in the error message */ | |
111 | taint_proper("%%ENV is aliased to %%%s%s", name); | |
112 | /* this statement is reached under -t or -U */ | |
284167a5 | 113 | TAINT_set(was_tainted); |
9a9b5ec9 DM |
114 | #ifdef NO_TAINT_SUPPORT |
115 | PERL_UNUSED_VAR(was_tainted); | |
116 | #endif | |
c038024b | 117 | } |
142393a6 | 118 | |
1e422769 | 119 | #ifdef VMS |
82f1aded | 120 | { |
1e422769 | 121 | int i = 0; |
0dc443ab | 122 | char name[10 + TYPE_DIGITS(int)] = "DCL$PATH"; |
86c11942 | 123 | STRLEN len = 8; /* strlen(name) */ |
1e422769 | 124 | |
125 | while (1) { | |
19742f39 | 126 | MAGIC* mg; |
1e422769 | 127 | if (i) |
03f39617 | 128 | len = my_snprintf(name, sizeof name, "DCL$PATH;%d", i); |
86c11942 | 129 | svp = hv_fetch(GvHVn(PL_envgv), name, len, FALSE); |
6b88bc9c | 130 | if (!svp || *svp == &PL_sv_undef) |
1e422769 | 131 | break; |
132 | if (SvTAINTED(*svp)) { | |
133 | TAINT; | |
134 | taint_proper("Insecure %s%s", "$ENV{DCL$PATH}"); | |
135 | } | |
c038024b | 136 | if ((mg = mg_find(*svp, PERL_MAGIC_envelem)) && MgTAINTEDDIR(mg)) { |
1e422769 | 137 | TAINT; |
138 | taint_proper("Insecure directory in %s%s", "$ENV{DCL$PATH}"); | |
139 | } | |
140 | i++; | |
141 | } | |
82f1aded | 142 | } |
1e422769 | 143 | #endif /* VMS */ |
79072805 | 144 | |
a4fc7abc | 145 | svp = hv_fetchs(GvHVn(PL_envgv),"PATH",FALSE); |
1e422769 | 146 | if (svp && *svp) { |
19742f39 | 147 | MAGIC* mg; |
1e422769 | 148 | if (SvTAINTED(*svp)) { |
149 | TAINT; | |
bbce6d69 | 150 | taint_proper("Insecure %s%s", "$ENV{PATH}"); |
1e422769 | 151 | } |
c038024b | 152 | if ((mg = mg_find(*svp, PERL_MAGIC_envelem)) && MgTAINTEDDIR(mg)) { |
1e422769 | 153 | TAINT; |
154 | taint_proper("Insecure directory in %s%s", "$ENV{PATH}"); | |
155 | } | |
79072805 | 156 | } |
79072805 | 157 | |
c90c0ff4 | 158 | #ifndef VMS |
159 | /* tainted $TERM is okay if it contains no metachars */ | |
a4fc7abc | 160 | svp = hv_fetchs(GvHVn(PL_envgv),"TERM",FALSE); |
c90c0ff4 | 161 | if (svp && *svp && SvTAINTED(*svp)) { |
8b6b16e7 | 162 | STRLEN len; |
284167a5 | 163 | const bool was_tainted = TAINT_get; |
cfd0369c | 164 | const char *t = SvPV_const(*svp, len); |
8772537c | 165 | const char * const e = t + len; |
9a9b5ec9 | 166 | |
284167a5 | 167 | TAINT_set(was_tainted); |
9a9b5ec9 DM |
168 | #ifdef NO_TAINT_SUPPORT |
169 | PERL_UNUSED_VAR(was_tainted); | |
170 | #endif | |
0eb30aeb | 171 | if (t < e && isWORDCHAR(*t)) |
c90c0ff4 | 172 | t++; |
0eb30aeb | 173 | while (t < e && (isWORDCHAR(*t) || strchr("-_.+", *t))) |
c90c0ff4 | 174 | t++; |
175 | if (t < e) { | |
176 | TAINT; | |
177 | taint_proper("Insecure $ENV{%s}%s", "TERM"); | |
178 | } | |
179 | } | |
180 | #endif /* !VMS */ | |
181 | ||
7bac28a0 | 182 | for (e = misc_env; *e; e++) { |
0bd48802 | 183 | SV * const * const svp = hv_fetch(GvHVn(PL_envgv), *e, strlen(*e), FALSE); |
3280af22 | 184 | if (svp && *svp != &PL_sv_undef && SvTAINTED(*svp)) { |
7bac28a0 | 185 | TAINT; |
186 | taint_proper("Insecure $ENV{%s}%s", *e); | |
187 | } | |
bbce6d69 | 188 | } |
189 | } | |
66610fdd RGS |
190 | |
191 | /* | |
14d04a33 | 192 | * ex: set ts=8 sts=4 sw=4 et: |
37442d52 | 193 | */ |