This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Command Injection Defense Cheat Sheet"

From OWASP
Jump to: navigation, search
(Authors and Primary Editors)
(Introduction)
Line 14: Line 14:
 
= Introduction =
 
= Introduction =
  
TBD
+
1) What is Command Injection?
 +
   
 +
2) Defense against unintentional OS interaction
 +
   
 +
2a) LFI Local File Inclusion
 +
 
 +
2b) RFI Remote File Inclusion
 +
   
 +
2c) Code Level injection
 +
* ENV variables
 +
* code creation
 +
 
 +
3) Safe design for features where OS interaction is intentional
 +
   
 +
3a) Like safely calling ImageMagik to do image manipulation, etc
 +
I CCed in a few other folks who are interested in this topic.
 +
 
 +
3b)  TBD example
 +
 
 +
3c) TBD example
 +
 
 +
4) Summary
 +
 
 +
TBD takeaway language agnostic approaches list
 +
TBD takeway language specific approaches list
  
 
= Details =  
 
= Details =  

Revision as of 23:39, 9 August 2016

WORK IN PROGRESS

Cheatsheets-header.jpg

Last revision (mm/dd/yy): 08/9/2016

Introduction

This cheat sheet provides some best practice for developers to follow to avoid the risk of Command Injection

Introduction

1) What is Command Injection?

2) Defense against unintentional OS interaction

2a) LFI Local File Inclusion

2b) RFI Remote File Inclusion

2c) Code Level injection

  • ENV variables
  • code creation

3) Safe design for features where OS interaction is intentional

3a) Like safely calling ImageMagik to do image manipulation, etc

I CCed in a few other folks who are interested in this topic.

3b) TBD example

3c) TBD example

4) Summary

TBD takeaway language agnostic approaches list TBD takeway language specific approaches list

Details

TBD

Authors and Primary Editors

Jim Manico - jim[at]owasp.org

Scott Davis - scott_davis[at]rapid7.com

Other Cheatsheets