Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Scene name abuse can lead to RFI/Command injection #6

Open
hyakuhei opened this issue Dec 26, 2021 · 1 comment
Open

Scene name abuse can lead to RFI/Command injection #6

hyakuhei opened this issue Dec 26, 2021 · 1 comment

Comments

@hyakuhei
Copy link
Owner

LTM generates file names using user supplied input.

LTM calls out to the system she’ll using user supplied input.

these are both fine if LTM is used as a CLI. However, they will be problematic if LTM moves in the direction of running as a web service.

example:
scene: “& nc -l 31337”

@hyakuhei
Copy link
Owner Author

hyakuhei commented Jan 1, 2022

ltm/src/jtg.py

Line 136 in 8458c0c

fileName = f"output/{sceneName}"

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant