FP Web

Jose Lerebours fpgroups at gmail.com
Mon Jul 8 03:14:15 PDT 2019


On 7/8/19 12:30 AM, Fairlight via Filepro-list wrote:
>> Per injections, well, that has nothing to do with the back-end
>> binaries but with the way the programmer writes his/her code.  Of
>> course, if fileProWeb does not provide means to sanitize data, we
>> then have a totally different subject.
> Not actually true, in the case of fpcgi 1.x and the default for 2.x.
> The whole concept of putting the command-lines as hidden fields was
> ill-conceived, to put it as politely as possible.  Even after they were
> made aware of the ramifications, they only provided an alternative
> server-side only methodology for 2.x, but kept the client-side methodology
> as the default.  Allegedly for purposes of backwards compatibility.  I
> don't even think the alternative was widely communicated.  So yes,
> injections -were- an issue with fpcgi, just not in the conventional
> SQL injection context.  Worse, honestly, since you could inject entire
> arbitrary commands.  It was an issue even on Windows.  There were also
> multiple different characters to use to trigger it.  They eventually fixed
> it, but that was -not- a good demonstration of security awareness.
>
> Then there was the makedir suid root hidden-password bypass at a system
> level, if you had any system shell access and could access the path to the
> binary.  Don't start me.

The way I see it,

(1) if "system" commands are needed to get to the data, then it is not a 
"native" solution; I stick to what I already know and works.
(2) It needs to have ability to run cURL and WSDL construct for data 
sharing (IN/OUT)
(3) It needs to have ability to use input in GET and POST modes

Being an old school developer, I can live with procedural architecture 
but OOP is where it should be.  I want to believe that they have hacked 
an open source binary like PHP, Perl or Python and made it their own, 
one where your typical filePro commands work:

lookup alias = fileName i=A k="Hello World!"

This would be the equivalent of a SQL query

SELECT * FROM fileName WHERE keyField = "HelloWorld!"

Then I can proceed to parse through the array object returned by the 
lookup/SELECT command without having to break out to a shell using "system".



-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.celestial.com/pipermail/filepro-list/attachments/20190708/eff573e9/attachment.html>


More information about the Filepro-list mailing list