Commit 7662e6a
committed
security: fix CodeQL command injection and URL sanitization issues
- Add '--' separator in git clone to prevent flag injection via repo names
- Validate SSH host key paths to prevent command injection in ssh-keygen
- Use strict equality for GitHub/GitLab hostname checks to prevent subdomain spoofing
- Add .gitignore entry for test/.ssh/ directory
Fixes CodeQL security alerts:
- Second order command injection (2 instances)
- Incomplete URL substring sanitization (2 instances)
- Uncontrolled command line (1 instance)1 parent bfed68a commit 7662e6a
File tree
4 files changed
+14
-3
lines changed- src/proxy
- processors/push-action
- ssh
4 files changed
+14
-3
lines changed| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
272 | 272 | | |
273 | 273 | | |
274 | 274 | | |
| 275 | + | |
275 | 276 | | |
276 | 277 | | |
277 | 278 | | |
278 | 279 | | |
279 | 280 | | |
280 | 281 | | |
281 | 282 | | |
| 283 | + | |
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
59 | 59 | | |
60 | 60 | | |
61 | 61 | | |
62 | | - | |
| 62 | + | |
63 | 63 | | |
64 | 64 | | |
65 | 65 | | |
| |||
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
194 | 194 | | |
195 | 195 | | |
196 | 196 | | |
197 | | - | |
| 197 | + | |
198 | 198 | | |
199 | | - | |
| 199 | + | |
200 | 200 | | |
201 | 201 | | |
202 | 202 | | |
| |||
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
35 | 35 | | |
36 | 36 | | |
37 | 37 | | |
| 38 | + | |
| 39 | + | |
| 40 | + | |
| 41 | + | |
| 42 | + | |
| 43 | + | |
| 44 | + | |
| 45 | + | |
| 46 | + | |
38 | 47 | | |
39 | 48 | | |
40 | 49 | | |
| |||
0 commit comments