-
Notifications
You must be signed in to change notification settings - Fork 94
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
Vulnerability detected CWE ID 88 in version 4.2.0 #81
Comments
I am not sure there is a vulnerability here: the line in question is
|
PS: the specific error message reported by the security scanner for the The only way that I can think of for an "argument injection" to be achieved via a "print" call is by using the output of this library to create a command, which is then executed via a shell. I wonder if the issue here is not in a known vulnerability in the To be honest, the only way for me to make a proper, detailed, irrefutable analysis of this ticket, as well as of ticket #82, would be to talk to the developers of the security scanner in use, to better understand which code scanning rules are exactly triggering these reports. Attack scenarios, either in code or pseudo-code, would also do. |
After some playing around, I found something which I think could be classified as a very low impact security issue. The "low impact" assessment is related to the fact that the developer would have to go out of his/her own way in order to allow a malicious actor to take advantage of the problem, short of having already gained Remote Code Execution. I will release a fix in the form of updated usage documentation in the next release, which should not be very far. |
In the end, I decided to go for a code fix rather than pure documentation. Detailed explanation of the specific conditions in which this issue might be abused are in https://github.com/gggeek/phpxmlrpc/releases/tag/4.9.0 Thanks for reporting this - and sorry for taking so long to fix it. I did underestimate the reported security-related tickets because there was little information provided regarding the exact problem scenario / underlying issue, and the reports seemed to come from an automated scanner tool, run without any verification of its findings, and my own experience that leads usually to a large number of false positives. |
En la ruta: /src/Client.php 829
Nombre de la vulnerabilidad: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Modo de detección: Se realizó un escaneo estático, el cuál detecto la línea mencionada como vulnerabilidad según los estándares de seguridad
The text was updated successfully, but these errors were encountered: