Skip to content

Commit 4e2f0ca

Browse files
myterongkunz
andauthored
Update docs/Secure-Coding-Guide-for-Python/CWE-707/CWE-78/README.md
Co-authored-by: Georg Kunz <[email protected]> Signed-off-by: myteron <[email protected]>
1 parent e63e5bd commit 4e2f0ca

File tree

1 file changed

+1
-1
lines changed
  • docs/Secure-Coding-Guide-for-Python/CWE-707/CWE-78

1 file changed

+1
-1
lines changed

docs/Secure-Coding-Guide-for-Python/CWE-707/CWE-78/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ list_dir("temp")
123123

124124
```
125125

126-
In `noncompliant02.py` we have the attacker create a file toast.sh file that contains the commands to run. The attacker also creates a folder named `. -exec bash toast.sh {} +` that will later become part of the shell `find` command forming `find . -exec bash toast.sh {} +`.
126+
In `noncompliant02.py` the attacker creates a `toast.sh` file that contains the commands to run. The attacker also creates a folder named `. -exec bash toast.sh {} +` that will later become part of the shell `find` command forming `find . -exec bash toast.sh {} +`.
127127

128128
The result is that `list_dir(dirname)` will run the `toast.sh` as a shell script. The `toast.sh` file does not require execute rights and can contain any quantity of shell command complexity.
129129

0 commit comments

Comments
 (0)