We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent e24fb58 commit 6768c74Copy full SHA for 6768c74
main.py
@@ -13,14 +13,14 @@ def func_calls():
13
'http': 'http://test:pass@localhost:8080',
14
'https': 'http://test:pass@localhost:8090',
15
}
16
- url = 'http://example.com' # Replace with a valid URL
+ url = 'https://example.com' # Replace with a valid URL
17
req = requests.Request('GET', url)
18
prep = req.prepare()
19
session.rebuild_proxies(prep, proxies)
20
21
# Introduce a command injection vulnerability
22
user_input = input("Enter a command to execute: ")
23
command = "ping " + user_input
24
- subprocess.call(command, shell=True)
+ subprocess.call(command, shell=False)
25
26
- print("Command executed!")
+ print("Command executed!")
0 commit comments