Property
Languagepython
Severityhigh
CWECWE-78: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’)
OWASPA01:2017 - Injection
Confidence LevelMedium
Impact LevelMedium
Likelihood LevelHigh

Description#

User-provided data from the ’event’ object is passed directly to ‘asyncio.loop.subprocess_exec’, which can allow untrusted input to be executed as part of a system command. This creates a risk of command injection if the input is not properly sanitized.

Impact#

If exploited, an attacker could run arbitrary commands on your server with the application’s privileges, potentially leading to data theft, service disruption, or full system compromise. This can severely impact the security and integrity of your application and infrastructure.