Property
Languagepython
Severitymedium
CWECWE-78: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’)
OWASPA01:2017 - Injection
Confidence LevelMedium
Impact LevelLow
Likelihood LevelHigh

Description#

Using subprocess functions with shell=True runs commands through the system shell, which can make your code vulnerable to command injection if user input is involved. This means attackers could execute arbitrary system commands by manipulating inputs.

Impact#

If an attacker is able to supply input to these subprocess calls, they could run unauthorized commands on your server, potentially leading to data theft, server compromise, or service disruption. This can result in loss of sensitive information and control over your application environment.