Command Injection #60485
-
Hi Team, I'm encountering a Command Injection vulnerability in the Symfony/Component/Intl/Resources/bin/update-data.php file, specifically at lines 169 and 173. The issue is described as: Unsanitized input from an HTTP header flows into exec, where it is used to build a shell command. This may result in a Command Injection vulnerability. ![]() |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment
-
https://symfony.com/doc/current/contributing/code/security.html |
Beta Was this translation helpful? Give feedback.
https://symfony.com/doc/current/contributing/code/security.html