Uploaded image for project: 'Thrift'
  1. Thrift
  2. THRIFT-3893

Command injection in format_go_output

    XMLWordPrintableJSON

Details

    • Bug
    • Status: Closed
    • Major
    • Resolution: Fixed
    • 0.9.3
    • 0.10.0
    • Go - Compiler

    Description

      format_go_output runs gofmt on a file_path which is derived from the service name. If a malicious user is able to provide a service name to a framework invoking thrift, a user-supplied service name could lead to shell command injection.

      A potential fix would be to escaping on the file_path or ensuring that it adheres to a whitelist of characters, e.g. [A-Za-z0-9_-].

      Attachments

        Issue Links

          Activity

            People

              jensg Jens Geyer
              groebert@google.com Felix Groebert
              Votes:
              0 Vote for this issue
              Watchers:
              3 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved: