File tree Expand file tree Collapse file tree 1 file changed +3
-3
lines changed
javascript/ql/src/Security/CWE-078 Expand file tree Collapse file tree 1 file changed +3
-3
lines changed Original file line number Diff line number Diff line change 6
6
<p >
7
7
8
8
Dynamically constructing a shell command with inputs from exported
9
- functions, may inadvertently change the meaning of the shell command.
9
+ functions may inadvertently change the meaning of the shell command.
10
10
11
11
Clients using the exported function may use inputs containing
12
12
characters that the shell interprets in a special way, for instance
37
37
38
38
<p >
39
39
The following example shows a dynamically constructed shell
40
- command that downloads a file from a remote url .
40
+ command that downloads a file from a remote URL .
41
41
</p >
42
42
43
43
<sample src =" examples/unsafe-shell-command-construction.js" />
50
50
51
51
<p >
52
52
Even worse, a client might pass in user-controlled
53
- data not knowing that the input is interpreted as a shell command.
53
+ data, not knowing that the input is interpreted as a shell command.
54
54
This could allow a malicious user to provide the input <code >http://example.org; cat /etc/passwd</code >
55
55
in order to execute the command <code >cat /etc/passwd</code >.
56
56
</p >
You can’t perform that action at this time.
0 commit comments