VirtualRPC oops
nemo (145) 2546 posts |
I’ve just discovered that |
Clive Semmens (2335) 3276 posts |
Not having a VirtualRPC to try this on, I’ll take your word for it. I might investigate what it does on a Pi, or do I risk terminal confusion? |
nemo (145) 2546 posts |
Nah it’s a HostFS thing specific to emulators. VirtualRPC accidentally allows you to ‘parent’ out of your mounted sandbox by using Windows syntax within a RISC OS filename. D’oh. Did you get the tokens of my esteem that I entrusted to the same organisation that sent your parcel a motorway trip away? |
Clive Semmens (2335) 3276 posts |
Yup, yesterday when I arrived home from trip to Scotland, thanks – I emailed you yesterday! |
Chris Hall (132) 3554 posts |
My copy of VRPC Adj allows me to access C:/VirtualAcorn (by Filer_openDir //.//) but not C:/ – this seems to be a security loophole? |
Rick Murray (539) 13840 posts |
RedSquirrel (0.6) also has this issue.
Jeez. |
Rick Murray (539) 13840 posts |
*Info //.//.//.//.Windows.System32.NTOSKRNL/EXE NTOSKRNL/EXE WR/WR Text 14:00:00 24-Feb-2009 2253 Kbytes |
nemo (145) 2546 posts |
Chris joked
Considering one can |
Rick Murray (539) 13840 posts |
More likely somebody forgetting that “.” is self and “..” is parent, and thus treating them as valid objects instead of filtering them out. Oops. |
Rick Murray (539) 13840 posts |
Wait – you can mount any arbitrary host path from within the emulator? |
nemo (145) 2546 posts |
Oh yes indeed. VirtualRPC is as ‘secure’ as a Command Window. ;-) And it has CallWin32 as well, of course. |
Steve Pampling (1551) 8170 posts |
So a NET USE to some arbitrary shared resource and then mount in RO should be relatively easy. |
nemo (145) 2546 posts |
Indeed. VirtualRPC already exposes all the Windows printers as HostFS devices. But yes, anything mapped to a drive letter can be accessed. |