This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Command Injection Defense Cheat Sheet"
From OWASP
(→Authors and Primary Editors) |
(→Introduction) |
||
Line 14: | Line 14: | ||
= Introduction = | = Introduction = | ||
− | TBD | + | 1) What is Command Injection? |
+ | |||
+ | 2) Defense against unintentional OS interaction | ||
+ | |||
+ | 2a) LFI Local File Inclusion | ||
+ | |||
+ | 2b) RFI Remote File Inclusion | ||
+ | |||
+ | 2c) Code Level injection | ||
+ | * ENV variables | ||
+ | * code creation | ||
+ | |||
+ | 3) Safe design for features where OS interaction is intentional | ||
+ | |||
+ | 3a) Like safely calling ImageMagik to do image manipulation, etc | ||
+ | I CCed in a few other folks who are interested in this topic. | ||
+ | |||
+ | 3b) TBD example | ||
+ | |||
+ | 3c) TBD example | ||
+ | |||
+ | 4) Summary | ||
+ | |||
+ | TBD takeaway language agnostic approaches list | ||
+ | TBD takeway language specific approaches list | ||
= Details = | = Details = |