mirror of
https://github.com/apache/httpd.git
synced 2025-08-15 23:27:39 +00:00
These files cannot be distributed at present - Justin, update your RC.32
Win32 is not escaping or rejecting ANY hazerdous shell command strings in Apache 2.0 at present. These would include the pipe character (|) which allows the user to construct malicious request strings. This needs consideration in code and configuration before we reintroduce a batch-file based example. Reported by: Ory Segal <ORY.SEGAL@SANCTUMINC.COM> 13 Feb 2002 git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@93393 13f79535-47bb-0310-9956-ffa450edef68
This commit is contained in:
@ -413,7 +413,6 @@ _install:
|
||||
}
|
||||
}
|
||||
<<
|
||||
copy docs\cgi-examples\test-cgi.bat "$(INSTDIR)\cgi-bin" <.y
|
||||
xcopy docs\error "$(INSTDIR)\error" /s /d < .a
|
||||
xcopy docs\docroot "$(INSTDIR)\htdocs" /d < .a
|
||||
xcopy docs\manual "$(INSTDIR)\manual" /s /d < .a
|
||||
|
@ -1,26 +0,0 @@
|
||||
@echo off
|
||||
REM Convince MSIE that this is NOT a client-side executable batch file!
|
||||
echo Content-disposition: inline; filename="test-cgi"
|
||||
echo Content-type: text/plain
|
||||
echo.
|
||||
echo CGI/1.0 test script report:
|
||||
echo.
|
||||
echo args are "%0 %*".
|
||||
echo.
|
||||
echo SERVER_SOFTWARE = %SERVER_SOFTWARE%
|
||||
echo SERVER_NAME = %SERVER_NAME%
|
||||
echo GATEWAY_INTERFACE = %GATEWAY_INTERFACE%
|
||||
echo SERVER_PROTOCOL = %SERVER_PROTOCOL%
|
||||
echo SERVER_PORT = %SERVER_PORT%
|
||||
echo REQUEST_METHOD = %REQUEST_METHOD%
|
||||
echo HTTP_ACCEPT = "%HTTP_ACCEPT%"
|
||||
echo PATH_INFO = "%PATH_INFO%"
|
||||
echo PATH_TRANSLATED = "%PATH_TRANSLATED%"
|
||||
echo SCRIPT_NAME = "%SCRIPT_NAME%"
|
||||
echo QUERY_STRING = "%QUERY_STRING%"
|
||||
echo REMOTE_HOST = %REMOTE_HOST%
|
||||
echo REMOTE_ADDR = %REMOTE_ADDR%
|
||||
echo REMOTE_USER = %REMOTE_USER%
|
||||
echo AUTH_TYPE = %AUTH_TYPE%
|
||||
echo CONTENT_TYPE = %CONTENT_TYPE%
|
||||
echo CONTENT_LENGTH = %CONTENT_LENGTH%
|
Reference in New Issue
Block a user