This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Command Injection Defense Cheat Sheet"
From OWASP
(→Authors and Primary Editors) |
(→Introduction) |
||
| Line 14: | Line 14: | ||
= Introduction = | = Introduction = | ||
| − | TBD | + | 1) What is Command Injection? |
| + | |||
| + | 2) Defense against unintentional OS interaction | ||
| + | |||
| + | 2a) LFI Local File Inclusion | ||
| + | |||
| + | 2b) RFI Remote File Inclusion | ||
| + | |||
| + | 2c) Code Level injection | ||
| + | * ENV variables | ||
| + | * code creation | ||
| + | |||
| + | 3) Safe design for features where OS interaction is intentional | ||
| + | |||
| + | 3a) Like safely calling ImageMagik to do image manipulation, etc | ||
| + | I CCed in a few other folks who are interested in this topic. | ||
| + | |||
| + | 3b) TBD example | ||
| + | |||
| + | 3c) TBD example | ||
| + | |||
| + | 4) Summary | ||
| + | |||
| + | TBD takeaway language agnostic approaches list | ||
| + | TBD takeway language specific approaches list | ||
= Details = | = Details = | ||
