Rishi2Monk has asked for the wisdom of the Perl Monks concerning the following question:
Checkmarx finds the below code is not safe says Path traversal vulnerable
Source: open(EXEC, "-|", "find $con_folder -name '*contribution.hygien +e*' "); @contribution_hygiene_report_name = <EXEC>; : : Destinamtion: open(EXEC, "-|", "echo \"$filename\n$contribution_preget_repor +t_name[0]\n$contribution_hygiene_report_name[0]\n$concfile\n$rpt_path +\n$concdir\n\" | uda_consolidate.pl 2 >> /dev/null"); $report_file = <EXEC>;
Kindly help me with possible and best solution to fix these kind of issues
|
---|
Replies are listed 'Best First'. | |
---|---|
Re: Path Traversal Vulnerability
by haukex (Archbishop) on Dec 27, 2022 at 07:09 UTC | |
by Rishi2Monk (Novice) on Dec 27, 2022 at 08:51 UTC | |
by Corion (Patriarch) on Dec 27, 2022 at 08:54 UTC | |
by haukex (Archbishop) on Dec 27, 2022 at 09:00 UTC | |
|