GNOME Bugzilla – Bug 671219
Completion for quoting/escaping of command parameters
Last modified: 2015-10-21 17:20:55 UTC
Some commands get constructed in the source files. I miss corresponding quoting/escaping for strings that are passed to the member function "Utils::execute_command". It seems that you can not be absolutely sure that no other and unwanted commands will be generated eventually by the reuse of a "special" path or mount point. Would you like to make the affected places safer? http://en.wikipedia.org/wiki/Code_injection#Shell_injection
Is the issue "Improper Neutralization of Special Elements used in a Command ('Command Injection')" relevant here? http://cwe.mitre.org/data/definitions/77.html
*** This bug has been marked as a duplicate of bug 740161 ***