-
Notifications
You must be signed in to change notification settings - Fork 21
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Improper text validation enables you to read ENV variables #7
Comments
promix17
changed the title
Improper text validation enables read ENV variables
Improper text validation enables you to read ENV variables
Apr 13, 2016
Yes this allows code execution. For example: |
The following methods are vulnerable:
I'll submit a patch shortly. |
@dejan I've submitted a patch. Please merge and |
dejan
added a commit
that referenced
this issue
May 14, 2016
dejan
added a commit
that referenced
this issue
May 14, 2016
Revert "Replace sanitized_text method - Fix #7"
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
This enables you to read env variables:
May be it is possible to perform RCE injection.
The text was updated successfully, but these errors were encountered: