HackerOne
hackerone.com βΊ blog βΊ how-command-injections
How To: Command Injections | HackerOne
July 7, 2017 - A command injection is a class of vulnerabilities where the attacker can control one or multiple commands that are being executed on a system. This post will go over the impact, how to test for it, defeating mitigations, and caveats.
Videos
HackerOne
hackerone.com βΊ reports βΊ 951249
[freespace] Command Injection due to Lack of Sanitization
It allows an attacker to inject and execute shell commands on Unix based systems. # Module **module name:** freespace **version:** 1.0.4 **npm page:** `https://www.npmjs.com/package/freespace` ## Module Description A library ...
HackerOne
hackerone.com βΊ reports βΊ 690010
Node.js third-party modules disclosed on HackerOne: OS Command...
I would like to report **OS Command Injection** vulnerability on [Jison](https://www.npmjs.com/package/jison) in parser ports. *(CSharp, PHP)* It allows arbitrary OS shell command execution through a crafted command-line argument. # Basic ...
HackerOne
hackerone.com βΊ reports βΊ 389561
Node.js third-party modules disclosed on HackerOne: Command...
It allows an attacker to inject arbitrary commands. # Module **module name:** kill-port **version:** 1.3.1 **npm page:** `https://www.npmjs.com/package/kill-port` ## Module Description Kill the process running on given port ...
HackerOne
hackerone.com βΊ reports βΊ 680480
U.S. Dept Of Defense disclosed on HackerOne: Command Injection (via...
**Summary:** The Navy has a Pulse Secure SSL VPN (https://ββββββββ/dana-na/auth/url_default/welcome.cgi) that is vulnerable to: CVE-2019-11510 - Pre-auth Arbitrary File Reading CVE-2019-11539 - Post-auth Command Injection vulnerable hostname from ssl certificate: ββββββββββ.navy.mil The pre-auth arbitrary file reading vulnerability (CVE-2019-11510) enables an un-authenicated user to read the...
HackerOne
hackerone.com βΊ reports βΊ 294462
Ruby disclosed on HackerOne: NET::Ftp allows command injection in...
Hi While using NET::Ftp I realised you could get command execution through "malicious" file names. The problem lies in the `gettextfile(remotefile, localfile = File.basename(remotefile))` method.
HackerOne
hackerone.com βΊ reports βΊ 303061
Report #303061 - RCE using bash command injection on / ...
February 27, 2018 - Sign in to HackerOne.
HackerOne
hackerone.com βΊ reports βΊ 651518
Ruby disclosed on HackerOne: OS Command Injection via egrep in...
When a file which has command file name of stating with `|` is in `Rake::FileList`, then `egrep` will execute the command. # How to reproduce PoC (`poc_rake.rb`) is the following.
HackerOne
hackerone.com βΊ reports βΊ 495382
Notepad++ disclosed on HackerOne: No SearchEngine sanatizing can...
##Information: **Summary:** Notepad++ is vulnerable to a command injection vulnerability. **Debug Info:** Notepad++ v7.6.3 (32-bit) Build time : Jan 27 2019 - 17:20:30 Path : C:\Program Files (x86)\Notepad++\notepad++.exe Admin mode : ON Local Conf mode : OFF OS : Windows 10 (64-bit) Plugins : none **Description:** When launching the web browser with the defined `SearchEngine`, the...
HackerOne
hackerone.com βΊ reports βΊ 1360208
Report #1360208 - OS command injection on seedr.ru
March 18, 2022 - Sign in to HackerOne.
HackerOne
hackerone.com βΊ reports βΊ 390631
Report #390631 - [ascii-art] Command injection
vulnerable versions: = 1.4.4
HackerOne
hackerone.com βΊ reports βΊ 871071
Node.js third-party modules disclosed on HackerOne: [gfc] Command...
I would like to report a `Command Injection` issue in the `gfc` module. It allows to execute arbitrary commands on the victim's PC. # Module **module name:** `gfc` **version:** `2.0.2` **npm page:** `https://www.npmjs.com/package/gfc` ## Module ...
HackerOne
hackerone.com βΊ reports βΊ 212696
Imgur disclosed on HackerOne: RCE by command line argument...
### Summary The `y` parameter of `/edit/process` endpoint (with `a=crop`) is vulnerable to command-line argument injection to something that appears to be GraphicsMagick utility (probably `gm convert`). Due to GraphicsMagick's hacker-friendly processing of `|`-starting filenames supplied to `-write` option, it leads to command execution.