input() is a security problem?
Remco Gerlich
scarblac at pino.selwerd.nl
Tue Jun 5 04:38:18 EDT 2001
Dan Stromberg <strombrg at seki.acs.uci.edu> wrote in comp.lang.python:
>
> In the following program:
>
> #!/dcs/packages/python-2.1/bin/python
>
> var=12345
>
> n=input('enter a number, or a variable name like "var": ')
>
> print n
>
>
>
> If one enters "var" at the prompt, one sees 12345.
>
> This seems to be a problem for setuid python scripts that may have
> access to data, stored in variables, that the user isn't supposed to
> be able to see.
>
> Yes, I know, use sys.stdin.readline() instead. I do. But... is
> there really a good reason for input to access variables this way? It
> seems an unnecessary pitfall.
That's what input() does - take input and eval() it. You could pass it
Enter a number: __import__("os").system("rm -rf /")
So use raw_input() in most cases. And don't make setuid scripts, there are
other security problems with that (the file might change while the kernel is
calling the interpreter from the #! line).
input() is mostly a convenience for absolute newbies, to enter a number and
use it as a number in Python. Raw_input() is better, os sys.stdin.readline()
which is almost the same thing.
--
Remco Gerlich
More information about the Python-list
mailing list