SHARE
Facebook X Pinterest WhatsApp

EarthWeb: Security Issues in Perl Scripts

Written By
thumbnail
Web Webster
Web Webster
Feb 7, 2001

“Perl is one of the most widely used languages for writing
interactive applications on the Web, and Perl programs are widely
used for various system administration tasks. Applications that
serve these tasks must provide reliable access to security
sensitive functions and information, and at the same time ensure
that no one is granted access to data or functionality that was not
intended for them. In this two-part article, Jordan Dimov and John
Viega evaluate some of the common security weaknesses and
vulnerabilities of Perl applications and give an overview of the
features that the Perl language provides to aid the programmer in
hardening the security of their applications.”

“A programming language, by design, does not normally constitute
a security risk; it is with the programmer that the risk is
introduced. Almost every language has certain flaws that may
facilitate to some extent the creation of insecure software, but
the overall security of a piece of software still depends largely
on the knowledge, understanding, and security consciousness of the
authors. Perl has its share of security “gotchas”, and most Perl
programmers are aware of none of them.”

“In this article, we will look at some of the most widely
misused and overlooked features of Perl. We’ll see how their
incorrect use can pose threats to the security of the system on
which they are running as well as to their users. We will show how
such weaknesses can be exploited and how to fix or avoid
them.”


Complete Story

thumbnail
Web Webster

Web Webster

Web Webster has more than 20 years of writing and editorial experience in the tech sector. He’s written and edited news, demand generation, user-focused, and thought leadership content for business software solutions, consumer tech, and Linux Today, he edits and writes for a portfolio of tech industry news and analysis websites including webopedia.com, and DatabaseJournal.com.

Recommended for you...

Red Hat reveals major enhancements to Red Hat Enterprise Linux AI
sjvn
Oct 22, 2024
How to Find AWS EC2 Instance Type Over SSH (6 Methods)
Benny Lanco
Sep 23, 2024
Crond: Daemon to Execute Scheduled Commands
Rose Hosting Blog
Sep 20, 2024
A Detailed Introduction to Oracle VirtualBox
Senthil Kumar
Sep 19, 2024
Linux Today Logo

LinuxToday is a trusted, contributor-driven news resource supporting all types of Linux users. Our thriving international community engages with us through social media and frequent content contributions aimed at solving problems ranging from personal computing to enterprise-level IT operations. LinuxToday serves as a home for a community that struggles to find comparable information elsewhere on the web.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.