X-Git-Url: http://git.i-scream.org/?a=blobdiff_plain;f=cgi-bin%2Fdocs.cgi;fp=cgi-bin%2Fdocs.cgi;h=f373219a07c7efb2fb0ed2ddabe0b97ce28616e7;hb=f3dea95c45f09985dee82aaebd8766df3fabedfc;hp=cb6c3d2bbe8dbb9fa83e81024156f0a96e7b5586;hpb=db6cd3db5462bf6aa6575651a28a44c3e5bc7680;p=www.i-scream.org.git diff --git a/cgi-bin/docs.cgi b/cgi-bin/docs.cgi index cb6c3d2..f373219 100755 --- a/cgi-bin/docs.cgi +++ b/cgi-bin/docs.cgi @@ -19,11 +19,26 @@ my ($bottom) = "../bottom.inc"; my ($query) = new CGI; -my ($doc) = ($query->param('doc') =~ /^\s*(.*?\.txt)\s*$/); -$doc = "../documentation/".$doc; + +# Note filenames may only have one dot in them, in the ".txt". +# This prevents malicious users using "../" to view files. +my ($doc) = ($query->param('doc') =~ /^\s*([^\.]*?\.txt)\s*$/); print "Content-type: text/html\n\n"; +unless (defined $doc) { + print "The link to this page was broken - it must specify a .txt file."; + exit; +} + +# Prevent hackers from supplying a malformed document string. +# I.e. only allow normal characters, slashes and dots. +unless ($doc =~ /^[a-zA-Z_\-0-9\.\/]+$/) { + print "Go Away, you nasty hax0r!"; + exit; +} +$doc = "../documentation/".$doc; + print <<"END";