Skip to content

Escape the shell arguments in order to prevent shell_exec access to requests

Christiaan requested to merge hotfix/escapeshellarg into master

Proof of concept:

curl --user ldapuser:ldappasswd "https://staging.uncinc.nl/\$\{IFS\}\`touch\$\{IFS\}/tmp/testfile\`\\"

This should fix the issues by single quoting the result and escaping any single quotes in the string, making it a single safe shell argument.

Merge request reports

Loading