3.0 KiB
3.0 KiB
github/codeql
javascript/ql/src/Security/CWE-078/examples/shell-command-injection-from-environment.js
function cleanupTemp() {
let cmd = "rm -rf " + path.join(__dirname, "temp");
cp.execSync(cmd); // BAD
}
This shell command depends on an uncontrolled absolute path.
javascript/ql/test/query-tests/Security/CWE-078/tst_shell-command-injection-from-environment.js
(function() {
cp.execFileSync('rm', ['-rf', path.join(__dirname, "temp")]); // GOOD
cp.execSync('rm -rf ' + path.join(__dirname, "temp")); // BAD
execa.shell('rm -rf ' + path.join(__dirname, "temp")); // NOT OK
This shell command depends on an uncontrolled absolute path.
javascript/ql/test/query-tests/Security/CWE-078/tst_shell-command-injection-from-environment.js
cp.execSync('rm -rf ' + path.join(__dirname, "temp")); // BAD
execa.shell('rm -rf ' + path.join(__dirname, "temp")); // NOT OK
execa.shellSync('rm -rf ' + path.join(__dirname, "temp")); // NOT OK
This shell command depends on an uncontrolled absolute path.
javascript/ql/test/query-tests/Security/CWE-078/tst_shell-command-injection-from-environment.js
execa.shell('rm -rf ' + path.join(__dirname, "temp")); // NOT OK
execa.shellSync('rm -rf ' + path.join(__dirname, "temp")); // NOT OK
const safe = "\"" + path.join(__dirname, "temp") + "\"";
This shell command depends on an uncontrolled absolute path.