Home / Vulnerability Database / Visual Basic 6 : Command injection
Visual Basic 6

Visual Basic 6 : Command injection

Overview

Executing commands obtained from data from an untrusted source is insecure.

Injection vulnerabilities take the first place in the “OWASP Top 10 2017” web-application vulnerabilities ranking. Command injection vulnerabilities are divided into two categories:

  1. An attacker modifies the command itself;
  2. An attacker replaces the value of the environment variables, which implicitly changes the semantics of the command being executed.

In the given case, the application is prone to the vulnerability of the first type.

A possible attack scenario:

  1. The application receives input data from an untrusted source, for example, user input.
  2. The data obtained is used as a part of the string that defines the command.
  3. Execution of the command gives an attacker the privileges which he did not previously possess.
MEDIUM

DerScanner Severity Score

Do you want to fix Visual Basic 6 : Command injection in your application?

See also

Visual Basic 6

Visual Basic 6 : Weak seed of random number generator

Visual Basic 6

Visual Basic 6 : Error bad handling

Visual Basic 6

Visual Basic 6 : Unsafe padding