Home / Vulnerability Database / Python : Injection Wildcard
Python
Python : Injection Wildcard
Classification
OWASP Top 10 2013
OWASP Top 10 2017
OWASP Top 10 2021
OWASP ASVS
CWE
Overview
Python provides a number of methods that emulate the behavior of standard Linux command line utilities. Like their Linux counterparts, these commands may take a wildcard “\*” character in place of a file system path. This is interpreted to mean “any and all files or folders” and can be used to build partially qualified paths, such as “/home/user/\*”.
The use of partially qualified paths may result in unintended consequences if an unexpected file or symlink is placed into the path location given. This becomes particularly dangerous when combined with commands used to manipulate file permissions or copy data off of a system.
It is especially dangerous to use of the following commands in conjunction with wild card parameters:
chownchmodtarrsync
CRITICAL
DerScanner Severity Score
Do you want to fix Python : Injection Wildcard in your application?
See also
Python
Python : Debug mode on
Python
Python : Web3: Deprecated method
Python
