We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 45f708b commit f978951Copy full SHA for f978951
cpp/ql/src/experimental/Security/CWE/CWE-078/WordexpTainted.qhelp
@@ -4,7 +4,10 @@
4
<qhelp>
5
<overview>
6
<p>The code passes user input to <code>wordexp</code>. This leaves the code
7
-vulnerable to attack by command injection, because <code>wordexp</code> performs command substitution.</p>
+vulnerable to attack by command injection, because <code>wordexp</code> performs command substitution.
8
+Command substitution is a feature that replaces <code>$(command)</code> or <code>`command`</code> with the
9
+output of the given command, allowing the user to run arbitrary code on the system.
10
+</p>
11
12
</overview>
13
<recommendation>
0 commit comments