Skip to content

[Precogs Alert] OS Command Injection detected (CWE-78, Risk: Critical)#3

Open
sameer6pre wants to merge 10 commits intomainfrom
Precogs-fix-5kqi2b08
Open

[Precogs Alert] OS Command Injection detected (CWE-78, Risk: Critical)#3
sameer6pre wants to merge 10 commits intomainfrom
Precogs-fix-5kqi2b08

Conversation

@sameer6pre
Copy link
Owner

Vulnerability Details

  • File Path: sample-vuln/test.py
  • Vulnerability Type: OS Command Injection
  • Risk Level: Critical

Explanation:
User-controlled input (user_path) is interpolated directly into a shell command string and executed via subprocess.getoutput, which passes the command to a shell. This enables injection of arbitrary shell commands (e.g., '; rm -rf /').

Please review and address the issue accordingly.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant