Property
Languagejava
Severitymedium
CWECWE-78: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’)
OWASPA01:2017 - Injection
Confidence LevelLow
Impact LevelHigh
Likelihood LevelLow

Description#

User-controlled input is being directly used in Runtime.exec() or Runtime.loadLibrary() calls after string concatenation or formatting. This allows an attacker to inject malicious commands into the system shell if the input is not properly sanitized.

Impact#

An attacker could execute arbitrary system commands on the server, potentially leading to data theft, server compromise, data loss, or full control over the affected system. This can result in severe security breaches, including unauthorized access and further attacks on your infrastructure.