Property
Languageclojure
Severitymedium
CWECWE-78: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’)
OWASPA01:2017 - Injection
Confidence LevelLow
Impact LevelHigh
Likelihood LevelMedium

Description#

The code executes shell commands using clojure.java.shell/sh with arguments that may include user input. If these inputs aren’t properly validated or sanitized, attackers could inject malicious commands.

Impact#

If exploited, an attacker could run arbitrary system commands on the server, leading to data theft, system compromise, or full remote code execution. This could result in loss of sensitive data, service disruption, or a complete takeover of the application environment.