Skip to content

Security: Command injection vulnerability in script execution #169

@sainesh-MW

Description

@sainesh-MW

Commands are constructed to be run on the runners (both github and self hosted runners) using string concatenation, allowing potential command injection if paths contain special characters.
I would suggest using exec.exec() with array arguments instead of concatenated command strings.

Metadata

Metadata

Assignees

No one assigned

    Labels

    enhancementNew feature or request

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions