gbarr is maintaining IO.
[p5sagit/p5-mst-13.2.git] / taint.c
CommitLineData
d6376244 1/* taint.c
2 *
4bb101f2 3 * Copyright (C) 1993, 1994, 1995, 1996, 1997, 1998, 1999,
4 * 2000, 2001, 2002, by Larry Wall and others
d6376244 5 *
6 * You may distribute under the terms of either the GNU General Public
7 * License or the Artistic License, as specified in the README file.
8 *
9 */
10
a0d0e21e 11/*
12 * "...we will have peace, when you and all your works have perished--and
13 * the works of your dark master to whom you would deliver us. You are a
14 * liar, Saruman, and a corrupter of men's hearts." --Theoden
15 */
16
166f8a29 17/* This file contains a few functions for handling data tainting in Perl
18 */
19
463ee0b2 20#include "EXTERN.h"
864dbfa3 21#define PERL_IN_TAINT_C
463ee0b2 22#include "perl.h"
23
24void
dff6d3cd 25Perl_taint_proper(pTHX_ const char *f, const char *s)
79072805 26{
26e623cf 27#if defined(HAS_SETEUID) && defined(DEBUGGING)
28# if Uid_t_size == 1
29 {
8772537c 30 const UV uid = PL_uid;
31 const UV euid = PL_euid;
26e623cf 32
8772537c 33 DEBUG_u(PerlIO_printf(Perl_debug_log,
26e623cf 34 "%s %d %"UVuf" %"UVuf"\n",
35 s, PL_tainted, uid, euid));
36 }
37# else
38 {
8772537c 39 const IV uid = PL_uid;
40 const IV euid = PL_euid;
26e623cf 41
8772537c 42 DEBUG_u(PerlIO_printf(Perl_debug_log,
26e623cf 43 "%s %d %"IVdf" %"IVdf"\n",
44 s, PL_tainted, uid, euid));
45 }
46# endif
a52cb5f7 47#endif
1e422769 48
3280af22 49 if (PL_tainted) {
8772537c 50 const char *ug;
51
22c35a8c 52 if (!f)
53 f = PL_no_security;
3280af22 54 if (PL_euid != PL_uid)
bbce6d69 55 ug = " while running setuid";
3280af22 56 else if (PL_egid != PL_gid)
bbce6d69 57 ug = " while running setgid";
6537fe72 58 else if (PL_taint_warn)
59 ug = " while running with -t switch";
60 else
bbce6d69 61 ug = " while running with -T switch";
6537fe72 62 if (PL_unsafe || PL_taint_warn) {
63 if(ckWARN(WARN_TAINT))
9014280d 64 Perl_warner(aTHX_ packWARN(WARN_TAINT), f, s, ug);
6537fe72 65 }
66 else {
67 Perl_croak(aTHX_ f, s, ug);
68 }
79072805 69 }
70}
71
72void
864dbfa3 73Perl_taint_env(pTHX)
79072805 74{
75 SV** svp;
7bac28a0 76 MAGIC* mg;
27da23d5 77 const char* const *e;
78 static const char* const misc_env[] = {
7bac28a0 79 "IFS", /* most shells' inter-field separators */
c90c0ff4 80 "CDPATH", /* ksh dain bramage #1 */
81 "ENV", /* ksh dain bramage #2 */
82 "BASH_ENV", /* bash dain bramage -- I guess it's contagious */
7bac28a0 83 NULL
84 };
1e422769 85
c038024b 86 /* Don't bother if there's no *ENV glob */
87 if (!PL_envgv)
142393a6 88 return;
c038024b 89 /* If there's no %ENV hash of if it's not magical, croak, because
90 * it probably doesn't reflect the actual environment */
91 if (!GvHV(PL_envgv) || !(SvRMAGICAL(GvHV(PL_envgv))
92 && mg_find((SV*)GvHV(PL_envgv), PERL_MAGIC_env))) {
e1ec3a88 93 const bool was_tainted = PL_tainted;
8772537c 94 const char * const name = GvENAME(PL_envgv);
c038024b 95 PL_tainted = TRUE;
96 if (strEQ(name,"ENV"))
97 /* hash alias */
98 taint_proper("%%ENV is aliased to %s%s", "another variable");
99 else
100 /* glob alias: report it in the error message */
101 taint_proper("%%ENV is aliased to %%%s%s", name);
102 /* this statement is reached under -t or -U */
103 PL_tainted = was_tainted;
104 }
142393a6 105
1e422769 106#ifdef VMS
82f1aded 107 {
1e422769 108 int i = 0;
0dc443ab 109 char name[10 + TYPE_DIGITS(int)] = "DCL$PATH";
1e422769 110
111 while (1) {
112 if (i)
113 (void)sprintf(name,"DCL$PATH;%d", i);
6b88bc9c 114 svp = hv_fetch(GvHVn(PL_envgv), name, strlen(name), FALSE);
115 if (!svp || *svp == &PL_sv_undef)
1e422769 116 break;
117 if (SvTAINTED(*svp)) {
118 TAINT;
119 taint_proper("Insecure %s%s", "$ENV{DCL$PATH}");
120 }
c038024b 121 if ((mg = mg_find(*svp, PERL_MAGIC_envelem)) && MgTAINTEDDIR(mg)) {
1e422769 122 TAINT;
123 taint_proper("Insecure directory in %s%s", "$ENV{DCL$PATH}");
124 }
125 i++;
126 }
82f1aded 127 }
1e422769 128#endif /* VMS */
79072805 129
3280af22 130 svp = hv_fetch(GvHVn(PL_envgv),"PATH",4,FALSE);
1e422769 131 if (svp && *svp) {
132 if (SvTAINTED(*svp)) {
133 TAINT;
bbce6d69 134 taint_proper("Insecure %s%s", "$ENV{PATH}");
1e422769 135 }
c038024b 136 if ((mg = mg_find(*svp, PERL_MAGIC_envelem)) && MgTAINTEDDIR(mg)) {
1e422769 137 TAINT;
138 taint_proper("Insecure directory in %s%s", "$ENV{PATH}");
139 }
79072805 140 }
79072805 141
c90c0ff4 142#ifndef VMS
143 /* tainted $TERM is okay if it contains no metachars */
3280af22 144 svp = hv_fetch(GvHVn(PL_envgv),"TERM",4,FALSE);
c90c0ff4 145 if (svp && *svp && SvTAINTED(*svp)) {
8b6b16e7 146 STRLEN len;
73d840c0 147 const bool was_tainted = PL_tainted;
cfd0369c 148 const char *t = SvPV_const(*svp, len);
8772537c 149 const char * const e = t + len;
3280af22 150 PL_tainted = was_tainted;
c90c0ff4 151 if (t < e && isALNUM(*t))
152 t++;
d085cc71 153 while (t < e && (isALNUM(*t) || strchr("-_.+", *t)))
c90c0ff4 154 t++;
155 if (t < e) {
156 TAINT;
157 taint_proper("Insecure $ENV{%s}%s", "TERM");
158 }
159 }
160#endif /* !VMS */
161
7bac28a0 162 for (e = misc_env; *e; e++) {
8772537c 163 SV ** const svp = hv_fetch(GvHVn(PL_envgv), *e, strlen(*e), FALSE);
3280af22 164 if (svp && *svp != &PL_sv_undef && SvTAINTED(*svp)) {
7bac28a0 165 TAINT;
166 taint_proper("Insecure $ENV{%s}%s", *e);
167 }
bbce6d69 168 }
169}
66610fdd 170
171/*
172 * Local variables:
173 * c-indentation-style: bsd
174 * c-basic-offset: 4
175 * indent-tabs-mode: t
176 * End:
177 *
37442d52 178 * ex: set ts=8 sts=4 sw=4 noet:
179 */