… | |
… | |
196 | package Urlader; |
196 | package Urlader; |
197 | |
197 | |
198 | use common::sense; |
198 | use common::sense; |
199 | |
199 | |
200 | BEGIN { |
200 | BEGIN { |
201 | our $VERSION = '0.2'; |
201 | our $VERSION = '1.0'; |
202 | |
202 | |
203 | use XSLoader; |
203 | use XSLoader; |
204 | XSLoader::load __PACKAGE__, $VERSION; |
204 | XSLoader::load __PACKAGE__, $VERSION; |
205 | } |
205 | } |
206 | |
206 | |
… | |
… | |
393 | cases, but often paths are embedded indirectly, so you might have to use a |
393 | cases, but often paths are embedded indirectly, so you might have to use a |
394 | I<dirty> string replacement. |
394 | I<dirty> string replacement. |
395 | |
395 | |
396 | =back |
396 | =back |
397 | |
397 | |
|
|
398 | =head1 SECURITY CONSIDERATIONS |
|
|
399 | |
|
|
400 | The urlader executable itself does not support setuig/setgid operation, or |
|
|
401 | running with elevated privileges - it does no input sanitisation, and is |
|
|
402 | trivially exploitable. |
|
|
403 | |
398 | =head1 AUTHOR |
404 | =head1 AUTHOR |
399 | |
405 | |
400 | Marc Lehmann <schmorp@schmorp.de> |
406 | Marc Lehmann <schmorp@schmorp.de> |
401 | http://home.schmorp.de/ |
407 | http://home.schmorp.de/ |
402 | |
408 | |