🛡️ Sentinel: Fix password handling and command parsing vulnerabilities #18
+111
−10
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🛡️ Sentinel Security Fix
Vulnerability:
entrypoint.sh. Passwords containing backslashes were corrupted byreadwithout-r.VPNCMD_SERVERandVPNCMD_HUBincorrectly processed semicolon-separated commands, executing only the first command in the list.Fix:
-rto allreadcommands to preserve backslashes.$usernameand$passwordvariables to prevent word splitting and globbing.VPNCMD_*variables to execute all commands.set -f(noglob) around dynamic command execution to safely allow argument splitting without filesystem globbing.Verification:
tests/verify_password_fix.shwhich reproduces the issues and verifies the fixes.bash -n.Journal:
.jules/sentinel.mdregarding shell script input handling risks.PR created automatically by Jules for task 14100508329879748494 started by @bluPhy