Details
-
Bug
-
Status: Closed
-
Major
-
Resolution: Fixed
-
0.9.3
Description
format_go_output runs gofmt on a file_path which is derived from the service name. If a malicious user is able to provide a service name to a framework invoking thrift, a user-supplied service name could lead to shell command injection.
A potential fix would be to escaping on the file_path or ensuring that it adheres to a whitelist of characters, e.g. [A-Za-z0-9_-].
Attachments
Issue Links
- links to