Skip to content

Potential command injection via Command API #42

@zfarrell

Description

@zfarrell

Find more live information in Aikido here: https://app.aikido.dev/queue?sidebarIssue=26573301&groupId=77741&sidebarIssueTask=4123271&sidebarTab=tasks

Scope

These issues affect the following code repository:

TLDR

While Rust's Command API follows security best practices by avoiding direct shell evaluation, improper handling of user inputs can still introduce command injection risks. If unsanitized user-controlled data is passed to Command::arg() or similar functions, an attacker may manipulate arguments to execute unintended commands, potentially leading to privilege escalation or system compromise

How to fix

Validate and sanitize user inputs, avoiding direct user-controlled arguments. Prefer passing structured data instead of raw strings, especially with format!, use safe argument parsing methods, and restrict allowed inputs through allowlists.

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions