SYM_PY_0112 - SymbioticSec/Symbiotic-Vulnerability-Database GitHub Wiki

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Property Value
Language python
Severity high
CWE CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
OWASP A01:2017 - Injection
Confidence Level Medium
Impact Level Medium
Likelihood Level High

Description

User-provided data from the 'event' object is passed directly to 'asyncio.loop.subprocess_exec', which can allow untrusted input to be executed as part of a system command. This creates a risk of command injection if the input is not properly sanitized.

Impact

If exploited, an attacker could run arbitrary commands on your server with the application's privileges, potentially leading to data theft, service disruption, or full system compromise. This can severely impact the security and integrity of your application and infrastructure.