SYM_PY_0107 - SymbioticSec/Symbiotic-Vulnerability-Database GitHub Wiki

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Property Value
Language python
Severity high
CWE CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
OWASP A01:2017 - Injection
Confidence Level Medium
Impact Level Medium
Likelihood Level High

Description

User input from the 'event' object is being passed directly to a subprocess call with shell=True, which allows the input to be interpreted as a shell command. This makes the code vulnerable to command injection if an attacker can control the event data.

Impact

If exploited, an attacker could execute arbitrary system commands with the permissions of the running process, potentially leading to data theft, system compromise, or disruption of service. This can result in significant security breaches, especially in environments handling sensitive data or critical operations.