Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Unsanitzed Input Leading to Command Injection [BUG] #1331

Open
TaranYourAss opened this issue Apr 6, 2024 · 0 comments
Open

Unsanitzed Input Leading to Command Injection [BUG] #1331

TaranYourAss opened this issue Apr 6, 2024 · 0 comments
Labels

Comments

@TaranYourAss
Copy link
Contributor

Description
Unsanitized input flows into the Process.Start() function, where it is used as a shell command. This results in the ability to execute arbitrary commands on users machines.

To Reproduce
Can be provided privately or publicly upon request.

Expected behaviour
Input should be validated before flowing into Process.Start() to ensure only expected types/structures of input are executed. More detailed explanation of expected behaviour can be provided privately or publicly upon request.

Screenshots
Can be provided privately or publicly upon request.

Desktop (please complete the following information):

  • XrmToolbox Version: 1.2023.12.68

Additional context
As this raised issue will be public, I have kept details on the vulnerability vague. If you would prefer to receive the details of the vulnerability privately, we can setup a private communication channel however you prefer. I can also provide the details of the vulnerability in this bug report. Please let me know.

MscrmTools added a commit that referenced this issue Jul 15, 2024
Update StoreFormFromPortal.cs - Issue #1331 Fix
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

1 participant