Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Address command-line injection vulnerability #311

Closed
wants to merge 3 commits into from

Conversation

bgamari
Copy link
Contributor

@bgamari bgamari commented Apr 9, 2024

The process library on Windows is vulnerable to a command
injection vulnerability, via cmd.exe's interpretation of
arguments. Processes that invoke batch files (.bat, .cmd) and
pass arguments whose values are affected by program inputs may be
affected.

Add some additional escaping to neutralise this scenario.

Also add some additional library documentation explaining how
arguments are processed on Windows.

Co-authored-By: Fraser Tweedale
HSEC-identifier: HSEC-2024-0003

bgamari and others added 3 commits April 9, 2024 13:25
The `process` library on Windows is vulnerable to a command
injection vulnerability, via `cmd.exe`'s interpretation of
arguments.  Processes that invoke batch files (`.bat`, `.cmd`) and
pass arguments whose values are affected by program inputs may be
affected.

Add some additional escaping to neutralise this scenario.

Also add some additional library documentation explaining how
arguments are processed on Windows.

Co-authored-By: Fraser Tweedale <[email protected]>
HSEC-identifier: HSEC-2024-0003
@bgamari bgamari closed this Apr 9, 2024
@bgamari bgamari deleted the wip/windows-batch-inj branch April 9, 2024 17:40
@bgamari
Copy link
Contributor Author

bgamari commented Apr 9, 2024

Superceded by #312.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant