You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Code injection could happen via environment variable.
In code here, it directly eval the value from environment variable. A malicous local actor could set something like export is_half='os.system("touch rickroll")' to execute arbitrary commands. It would be better to use ast.literal_eval here.
For ref, this issue is similar to CVE-2022-2054.
The text was updated successfully, but these errors were encountered:
Code injection could happen via environment variable.
In code here, it directly eval the value from environment variable. A malicous local actor could set something like
export is_half='os.system("touch rickroll")'
to execute arbitrary commands. It would be better to useast.literal_eval
here.For ref, this issue is similar to CVE-2022-2054.
The text was updated successfully, but these errors were encountered: