#374 HIGH: Shell command injection via unescaped variables
Description
Editshell_command.py:278-281 resolves variables and passes directly to shell=True subprocess. If {{user_input}} contains '; rm -rf /', it executes. Fix: Use shlex.quote() when interpolating variables into shell commands.
Comments
Loading comments...
Context
Loading context...
Audit History
View AllLoading audit history...