Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Prompt Injection in Headers Can Lead to Command Injection Vulnerabilities #4

Open
bayegaspard opened this issue Sep 29, 2024 · 3 comments

Comments

@bayegaspard
Copy link

bayegaspard commented Sep 29, 2024

Just like what I described in #3
we can see both the URL and headers parameters are susceptible to RCE. For instance, a custom header could include any system commands like whoami with back ticks, leading to potential exploitation on the pentester's server.
image

@bayegaspard
Copy link
Author

The same
max
thing can be seen for Max-per-class.

@sh0z3n
Copy link

sh0z3n commented Oct 3, 2024

exaclty , this part should be handled diffrently :
ffuf_command = [args.ffuf_path] + unknown + ['-e', extensions]
subprocess.run(ffuf_command)

@philipsinnott
Copy link

image

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants