Win32 is not escaping or rejecting ANY hazerdous shell command strings
in Apache 2.0 at present. These would include the pipe character (|)
which allows the user to construct malicious request strings.
This needs consideration in code and configuration before we reintroduce
a batch-file based example.
Reported by: Ory Segal <ORY.SEGAL@SANCTUMINC.COM> 13 Feb 2002
git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@93393 13f79535-47bb-0310-9956-ffa450edef68