TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

GitHub RCE by Environment variable injection Bug Bounty writeup

45 pointsby helperabout 11 years ago

5 comments

mappuabout 11 years ago
I decided to actually read man ld.so and came across this:<p><pre><code> --ignore-rpath LIST Ignore RPATH and RUNPATH information in object names in LIST. This option has been supported by glibc2 for about one hour. Then it was renamed into: --inhibit-rpath LIST </code></pre> I&#x27;m not sure if it&#x27;s a joke or an incredible testament to backwards compatibility.<p>I&#x27;ve been writing a COFF linker recently, and have been reading lots of comments and man pages about linkers and loaders. The more i read, i think dynamic linking isn&#x27;t such a good idea after all.
userbinatorabout 11 years ago
They must&#x27;ve expected usernames to not contain anything other than alphanumeric characters... this is yet another example of the fact that if you write code that consumes external, untrusted input, always expect every single byte value from 0 to 0xFF could be present, and deal with them accordingly.
kralljaabout 11 years ago
We prevent this specific attack in Kiln by only allowing specific environment variables to be set.
jwcruxabout 11 years ago
Any idea what the bounty was for this finding?
0x0about 11 years ago
Will this affect bitbucket as well?
评论 #7284147 未加载