Commit | Line | Data |
---|---|---|
d6376244 JH |
1 | /* taint.c |
2 | * | |
663f364b | 3 | * Copyright (C) 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, |
1129b882 | 4 | * 2002, 2003, 2004, 2005, 2006, 2007, 2008 by Larry Wall and others |
d6376244 JH |
5 | * |
6 | * You may distribute under the terms of either the GNU General Public | |
7 | * License or the Artistic License, as specified in the README file. | |
8 | * | |
9 | */ | |
10 | ||
a0d0e21e | 11 | /* |
4ac71550 TC |
12 | * '...we will have peace, when you and all your works have perished--and |
13 | * the works of your dark master to whom you would deliver us. You are a | |
cdad3b53 | 14 | * liar, Saruman, and a corrupter of men's hearts.' --Théoden |
4ac71550 TC |
15 | * |
16 | * [p.580 of _The Lord of the Rings_, III/x: "The Voice of Saruman"] | |
a0d0e21e LW |
17 | */ |
18 | ||
166f8a29 DM |
19 | /* This file contains a few functions for handling data tainting in Perl |
20 | */ | |
21 | ||
463ee0b2 | 22 | #include "EXTERN.h" |
864dbfa3 | 23 | #define PERL_IN_TAINT_C |
463ee0b2 LW |
24 | #include "perl.h" |
25 | ||
26 | void | |
e1c41806 | 27 | Perl_taint_proper(pTHX_ const char *f, const char *const s) |
79072805 | 28 | { |
26e623cf | 29 | #if defined(HAS_SETEUID) && defined(DEBUGGING) |
7918f24d NC |
30 | PERL_ARGS_ASSERT_TAINT_PROPER; |
31 | ||
26e623cf | 32 | { |
dfff4baf BF |
33 | const Uid_t uid = PerlProc_getuid(); |
34 | const Uid_t euid = PerlProc_geteuid(); | |
26e623cf | 35 | |
8b225b9c | 36 | #if Uid_t_sign == 1 /* uid_t is unsigned. */ |
8772537c | 37 | DEBUG_u(PerlIO_printf(Perl_debug_log, |
8b225b9c JH |
38 | "%s %d %"UVuf" %"UVuf"\n", |
39 | s, TAINT_get, (UV)uid, (UV)euid)); | |
40 | #else /* uid_t is signed (Uid_t_sign == -1), or don't know. */ | |
41 | DEBUG_u(PerlIO_printf(Perl_debug_log, | |
42 | "%s %d %"IVdf" %"IVdf"\n", | |
43 | s, TAINT_get, (IV)uid, (IV)euid)); | |
44 | #endif | |
26e623cf | 45 | } |
a52cb5f7 | 46 | #endif |
1e422769 | 47 | |
284167a5 | 48 | if (TAINT_get) { |
8772537c AL |
49 | const char *ug; |
50 | ||
22c35a8c GS |
51 | if (!f) |
52 | f = PL_no_security; | |
985213f2 | 53 | if (PerlProc_getuid() != PerlProc_geteuid()) |
bbce6d69 | 54 | ug = " while running setuid"; |
985213f2 | 55 | else if (PerlProc_getgid() != PerlProc_getegid()) |
bbce6d69 | 56 | ug = " while running setgid"; |
284167a5 | 57 | else if (TAINT_WARN_get) |
6537fe72 MS |
58 | ug = " while running with -t switch"; |
59 | else | |
bbce6d69 | 60 | ug = " while running with -T switch"; |
5d37acd6 | 61 | |
6fd06953 DM |
62 | /* XXX because taint_proper adds extra format args, we can't |
63 | * get the caller to check properly; o we just silence the warning | |
64 | * and hope the callers aren't naughty */ | |
65 | GCC_DIAG_IGNORE(-Wformat-nonliteral); | |
284167a5 | 66 | if (PL_unsafe || TAINT_WARN_get) { |
9b387841 | 67 | Perl_ck_warner_d(aTHX_ packWARN(WARN_TAINT), f, s, ug); |
6537fe72 MS |
68 | } |
69 | else { | |
70 | Perl_croak(aTHX_ f, s, ug); | |
71 | } | |
5d37acd6 DM |
72 | GCC_DIAG_RESTORE; |
73 | ||
79072805 LW |
74 | } |
75 | } | |
76 | ||
77 | void | |
864dbfa3 | 78 | Perl_taint_env(pTHX) |
79072805 LW |
79 | { |
80 | SV** svp; | |
7bac28a0 | 81 | MAGIC* mg; |
27da23d5 JH |
82 | const char* const *e; |
83 | static const char* const misc_env[] = { | |
7bac28a0 | 84 | "IFS", /* most shells' inter-field separators */ |
c90c0ff4 | 85 | "CDPATH", /* ksh dain bramage #1 */ |
86 | "ENV", /* ksh dain bramage #2 */ | |
87 | "BASH_ENV", /* bash dain bramage -- I guess it's contagious */ | |
e62a6770 RGS |
88 | #ifdef WIN32 |
89 | "PERL5SHELL", /* used for system() on Windows */ | |
90 | #endif | |
7bac28a0 | 91 | NULL |
92 | }; | |
1e422769 | 93 | |
c038024b RGS |
94 | /* Don't bother if there's no *ENV glob */ |
95 | if (!PL_envgv) | |
142393a6 | 96 | return; |
284167a5 | 97 | /* If there's no %ENV hash or if it's not magical, croak, because |
c038024b RGS |
98 | * it probably doesn't reflect the actual environment */ |
99 | if (!GvHV(PL_envgv) || !(SvRMAGICAL(GvHV(PL_envgv)) | |
daba3364 | 100 | && mg_find((const SV *)GvHV(PL_envgv), PERL_MAGIC_env))) { |
284167a5 | 101 | const bool was_tainted = TAINT_get; |
8772537c | 102 | const char * const name = GvENAME(PL_envgv); |
284167a5 | 103 | TAINT; |
c038024b RGS |
104 | if (strEQ(name,"ENV")) |
105 | /* hash alias */ | |
106 | taint_proper("%%ENV is aliased to %s%s", "another variable"); | |
107 | else | |
108 | /* glob alias: report it in the error message */ | |
109 | taint_proper("%%ENV is aliased to %%%s%s", name); | |
110 | /* this statement is reached under -t or -U */ | |
284167a5 | 111 | TAINT_set(was_tainted); |
9a9b5ec9 DM |
112 | #ifdef NO_TAINT_SUPPORT |
113 | PERL_UNUSED_VAR(was_tainted); | |
114 | #endif | |
c038024b | 115 | } |
142393a6 | 116 | |
1e422769 | 117 | #ifdef VMS |
82f1aded | 118 | { |
1e422769 | 119 | int i = 0; |
0dc443ab | 120 | char name[10 + TYPE_DIGITS(int)] = "DCL$PATH"; |
86c11942 | 121 | STRLEN len = 8; /* strlen(name) */ |
1e422769 | 122 | |
123 | while (1) { | |
124 | if (i) | |
86c11942 NC |
125 | len = my_sprintf(name,"DCL$PATH;%d", i); |
126 | svp = hv_fetch(GvHVn(PL_envgv), name, len, FALSE); | |
6b88bc9c | 127 | if (!svp || *svp == &PL_sv_undef) |
1e422769 | 128 | break; |
129 | if (SvTAINTED(*svp)) { | |
130 | TAINT; | |
131 | taint_proper("Insecure %s%s", "$ENV{DCL$PATH}"); | |
132 | } | |
c038024b | 133 | if ((mg = mg_find(*svp, PERL_MAGIC_envelem)) && MgTAINTEDDIR(mg)) { |
1e422769 | 134 | TAINT; |
135 | taint_proper("Insecure directory in %s%s", "$ENV{DCL$PATH}"); | |
136 | } | |
137 | i++; | |
138 | } | |
82f1aded | 139 | } |
1e422769 | 140 | #endif /* VMS */ |
79072805 | 141 | |
a4fc7abc | 142 | svp = hv_fetchs(GvHVn(PL_envgv),"PATH",FALSE); |
1e422769 | 143 | if (svp && *svp) { |
144 | if (SvTAINTED(*svp)) { | |
145 | TAINT; | |
bbce6d69 | 146 | taint_proper("Insecure %s%s", "$ENV{PATH}"); |
1e422769 | 147 | } |
c038024b | 148 | if ((mg = mg_find(*svp, PERL_MAGIC_envelem)) && MgTAINTEDDIR(mg)) { |
1e422769 | 149 | TAINT; |
150 | taint_proper("Insecure directory in %s%s", "$ENV{PATH}"); | |
151 | } | |
79072805 | 152 | } |
79072805 | 153 | |
c90c0ff4 | 154 | #ifndef VMS |
155 | /* tainted $TERM is okay if it contains no metachars */ | |
a4fc7abc | 156 | svp = hv_fetchs(GvHVn(PL_envgv),"TERM",FALSE); |
c90c0ff4 | 157 | if (svp && *svp && SvTAINTED(*svp)) { |
8b6b16e7 | 158 | STRLEN len; |
284167a5 | 159 | const bool was_tainted = TAINT_get; |
cfd0369c | 160 | const char *t = SvPV_const(*svp, len); |
8772537c | 161 | const char * const e = t + len; |
9a9b5ec9 | 162 | |
284167a5 | 163 | TAINT_set(was_tainted); |
9a9b5ec9 DM |
164 | #ifdef NO_TAINT_SUPPORT |
165 | PERL_UNUSED_VAR(was_tainted); | |
166 | #endif | |
0eb30aeb | 167 | if (t < e && isWORDCHAR(*t)) |
c90c0ff4 | 168 | t++; |
0eb30aeb | 169 | while (t < e && (isWORDCHAR(*t) || strchr("-_.+", *t))) |
c90c0ff4 | 170 | t++; |
171 | if (t < e) { | |
172 | TAINT; | |
173 | taint_proper("Insecure $ENV{%s}%s", "TERM"); | |
174 | } | |
175 | } | |
176 | #endif /* !VMS */ | |
177 | ||
7bac28a0 | 178 | for (e = misc_env; *e; e++) { |
0bd48802 | 179 | SV * const * const svp = hv_fetch(GvHVn(PL_envgv), *e, strlen(*e), FALSE); |
3280af22 | 180 | if (svp && *svp != &PL_sv_undef && SvTAINTED(*svp)) { |
7bac28a0 | 181 | TAINT; |
182 | taint_proper("Insecure $ENV{%s}%s", *e); | |
183 | } | |
bbce6d69 | 184 | } |
185 | } | |
66610fdd RGS |
186 | |
187 | /* | |
14d04a33 | 188 | * ex: set ts=8 sts=4 sw=4 et: |
37442d52 | 189 | */ |