🌐
HackerOne
hackerone.com β€Ί blog β€Ί how-command-injections
How To: Command Injections | HackerOne
July 7, 2017 - A command injection is a class of vulnerabilities where the attacker can control one or multiple commands that are being executed on a system. This post will go over the impact, how to test for it, defeating mitigations, and caveats.
🌐
HackerOne
hackerone.com β€Ί reports β€Ί 497312
Notepad++ disclosed on HackerOne: Command injection by setting a...
**Summary:** Arbitrary commands can be injected when using the "Search on Internet" function with a malicious custom search engine. The custom search engine can be set through the GUI or the config files, with different attack scenarios.
🌐
HackerOne
hackerone.com β€Ί reports β€Ί 685447
Report #685447 - gitlabhook OS Command Injection
It allows execution of arbitrary code on the remote server, that waits for instructions from gitlab. # Module **module name:** gitlabhook **version:** 0.0.17 **npm page:** `https://www.npmjs.com/package/gitlabhook` ## Module Description ...
🌐
HackerOne
hackerone.com β€Ί reports β€Ί 951249
[freespace] Command Injection due to Lack of Sanitization
It allows an attacker to inject and execute shell commands on Unix based systems. # Module **module name:** freespace **version:** 1.0.4 **npm page:** `https://www.npmjs.com/package/freespace` ## Module Description A library ...
🌐
HackerOne
hackerone.com β€Ί reports β€Ί 690010
Node.js third-party modules disclosed on HackerOne: OS Command...
I would like to report **OS Command Injection** vulnerability on [Jison](https://www.npmjs.com/package/jison) in parser ports. *(CSharp, PHP)* It allows arbitrary OS shell command execution through a crafted command-line argument. # Basic ...
🌐
HackerOne
hackerone.com β€Ί reports β€Ί 389561
Node.js third-party modules disclosed on HackerOne: Command...
It allows an attacker to inject arbitrary commands. # Module **module name:** kill-port **version:** 1.3.1 **npm page:** `https://www.npmjs.com/package/kill-port` ## Module Description Kill the process running on given port ...
🌐
HackerOne
hackerone.com β€Ί reports β€Ί 1161691
Ruby disclosed on HackerOne: OS Command Injection in 'rdoc'...
Details: If the `remove_unparseable` function receives a list of files with a command in the name of one of them, it will be executed. Just enough the name to match the pattern. The problem code: ```ruby def remove_unparseable files files.reject ...
🌐
HackerOne
hackerone.com β€Ί reports β€Ί 680480
U.S. Dept Of Defense disclosed on HackerOne: Command Injection (via...
**Summary:** The Navy has a Pulse Secure SSL VPN (https://β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ/dana-na/auth/url_default/welcome.cgi) that is vulnerable to: CVE-2019-11510 - Pre-auth Arbitrary File Reading CVE-2019-11539 - Post-auth Command Injection vulnerable hostname from ssl certificate: β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ.navy.mil The pre-auth arbitrary file reading vulnerability (CVE-2019-11510) enables an un-authenicated user to read the...
Find elsewhere
🌐
HackerOne
hackerone.com β€Ί reports β€Ί 294462
Ruby disclosed on HackerOne: NET::Ftp allows command injection in...
Hi While using NET::Ftp I realised you could get command execution through "malicious" file names. The problem lies in the `gettextfile(remotefile, localfile = File.basename(remotefile))` method.
🌐
HackerOne
hackerone.com β€Ί reports β€Ί 651518
Ruby disclosed on HackerOne: OS Command Injection via egrep in...
When a file which has command file name of stating with `|` is in `Rake::FileList`, then `egrep` will execute the command. # How to reproduce PoC (`poc_rake.rb`) is the following.
🌐
HackerOne
hackerone.com β€Ί reports β€Ί 327512
Ruby disclosed on HackerOne: Potential command injection in...
As `Shell#test` and `Shell#[]` use `send` when transferring to FileTest, private methods etc. can also be called. Therefore, command injection is possible when a crafted value is passed. ```ruby $...
🌐
HackerOne
hackerone.com β€Ί reports β€Ί 495382
Notepad++ disclosed on HackerOne: No SearchEngine sanatizing can...
##Information: **Summary:** Notepad++ is vulnerable to a command injection vulnerability. **Debug Info:** Notepad++ v7.6.3 (32-bit) Build time : Jan 27 2019 - 17:20:30 Path : C:\Program Files (x86)\Notepad++\notepad++.exe Admin mode : ON Local Conf mode : OFF OS : Windows 10 (64-bit) Plugins : none **Description:** When launching the web browser with the defined `SearchEngine`, the...
🌐
HackerOne
hackerone.com β€Ί reports β€Ί 298873
GitLab disclosed on HackerOne: Command injection by overwriting...
The `Projects::GitlabProjectsImportService` contains a vulnerability that allows an attacker to write files to arbitrary directories on the server. This leads to an arbitrary command execution vulnerability by overwriting the `authorized_keys` file.
🌐
HackerOne
hackerone.com β€Ί reports β€Ί 2904921
curl disclosed on HackerOne: OS Command Injection (subprocess...
**Summary** The Bandit tool flagged the usage of the ``subprocess``module in the file ``curl.py``under the **B404:blacklist rule**. This rule highlights potential security risks associated with using the subprocess module without proper sanitization ...
🌐
HackerOne
hackerone.com β€Ί reports β€Ί 871071
Node.js third-party modules disclosed on HackerOne: [gfc] Command...
I would like to report a `Command Injection` issue in the `gfc` module. It allows to execute arbitrary commands on the victim's PC. # Module **module name:** `gfc` **version:** `2.0.2` **npm page:** `https://www.npmjs.com/package/gfc` ## Module ...
🌐
HackerOne
hackerone.com β€Ί reports β€Ί 212696
Imgur disclosed on HackerOne: RCE by command line argument...
### Summary The `y` parameter of `/edit/process` endpoint (with `a=crop`) is vulnerable to command-line argument injection to something that appears to be GraphicsMagick utility (probably `gm convert`). Due to GraphicsMagick's hacker-friendly processing of `|`-starting filenames supplied to `-write` option, it leads to command execution.