Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Back Website by library rather than command line invocation #66

Open
mcandre opened this issue Apr 18, 2017 · 1 comment
Open

Back Website by library rather than command line invocation #66

mcandre opened this issue Apr 18, 2017 · 1 comment

Comments

@mcandre
Copy link

mcandre commented Apr 18, 2017

If someone edits the Angular frontend code, they can bypass some validation methods and supply a shell injection string similar to jq '.blah';hostname, in order to run shell commands on the server.

Maybe use a library like github.com/bongole/go-jq instead of shell commands, for safety?

@owenthereal
Copy link
Owner

Can you provide an example of this?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants