Home / Vulnerability Database / Python : Injection Wildcard
Python

Python : Injection Wildcard

Classification

OWASP Top 10 2013
OWASP Top 10 2017
OWASP Top 10 2021

Overview

Python provides a number of methods that emulate the behavior of standard Linux command line utilities. Like their Linux counterparts, these commands may take a wildcard “\*” character in place of a file system path. This is interpreted to mean “any and all files or folders” and can be used to build partially qualified paths, such as “/home/user/\*”.

The use of partially qualified paths may result in unintended consequences if an unexpected file or symlink is placed into the path location given. This becomes particularly dangerous when combined with commands used to manipulate file permissions or copy data off of a system.

It is especially dangerous to use of the following commands in conjunction with wild card parameters:

  • chown
  • chmod
  • tar
  • rsync
CRITICAL

DerScanner Severity Score

Do you want to fix Python : Injection Wildcard in your application?

See also

Python

Python : Debug mode on

Python

Python : Web3: Deprecated method

Python

Python : Unsafe padding