You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
If someone edits the Angular frontend code, they can bypass some validation methods and supply a shell injection string similar to jq '.blah';hostname, in order to run shell commands on the server.
Maybe use a library like github.com/bongole/go-jq instead of shell commands, for safety?
The text was updated successfully, but these errors were encountered:
If someone edits the Angular frontend code, they can bypass some validation methods and supply a shell injection string similar to
jq '.blah';hostname
, in order to run shell commands on the server.Maybe use a library like github.com/bongole/go-jq instead of shell commands, for safety?
The text was updated successfully, but these errors were encountered: