Skip to content

Conversation

@zeropath-ai-dev
Copy link

Summary

This PR addresses a critical Remote Code Execution (RCE) vulnerability in the /login endpoint. Previously, a GET request to /login processed user-supplied input via request.json['backdoor'] and executed it using subprocess.run with bash -c, allowing attackers to execute arbitrary shell commands on the server.

fix

The vulnerable code accepting and executing the backdoor parameter via subprocess.run has been removed. The /login endpoint for GET requests now simply returns a JSON error message with a 404 status, eliminating any code execution path. This closes the RCE vector and ensures that the endpoint is not exploitable by crafted GET requests.

author info

Patch provided by the Application Security Engineering team. Please contact appsec-team@example.com for any questions.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant