Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Checking scripts for potential injections #173

Open
ostasevych opened this issue Jun 2, 2024 · 0 comments
Open

Checking scripts for potential injections #173

ostasevych opened this issue Jun 2, 2024 · 0 comments

Comments

@ostasevych
Copy link

ostasevych commented Jun 2, 2024

Hi. The files scripts app is quite powerful and potentially may bring harm unintentionally due to bad programming.
My assumption is when a script runs some shell command connected with file/folder/device operations, and the value field is open text, that means that a user may submit the value in the manner that it will become a parameter for that command.

Eg command='rm %s', and %s is a value submitted by user. A user may submit `-f /home/alice/*' instead of a name of the file, or

command='cp %a %b' to copy data from one folder to another. A user may potentially submit ; rm -rf /home/alice to the text value field as the second option.

Is that possible to provide a special function which may check scripts for potential vulnerability for the systems if that scripts are run?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant