Skip to content

Vunerable to arbitrary command execution #45

@ExcaliburZero

Description

@ExcaliburZero

Currently PiCAST is vulnerable to arbitrary command execution due to the fact that it uses the command line to play videos.

Here is an example of an input that would cause unintended command execution:

localhost:3000/yt-stream/$(zenity --info --text "Arbitrary Command")

In order to fix this, you may want to add a way of making sure that the youtube video id is valid and does not contain $(SOME_COMMAND).

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions