We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
The code in this line is a potential vulnerability, if we load some data file with malicious content... https://github.com/fangq/jsonlab/blob/0a393469768575fe07d89f74ee75ced9d8d20c34/loadjson.m#L261
loadjson('{"root": [dir]}') executes Matlab code dir... loadjson('{"root": [system(...)]}') executes system commands!!!
Loading the file below will launch notepad.exe... (remove .log extension) vuln_test.json.log
The text was updated successfully, but these errors were encountered:
Prevent arbitrary code execution
4bf30b2
Parse the potential string with regexp instead of using eval. This addresses NeuroJSON#75
f7d8226
No branches or pull requests
The code in this line is a potential vulnerability, if we load some data file with malicious content...
https://github.com/fangq/jsonlab/blob/0a393469768575fe07d89f74ee75ced9d8d20c34/loadjson.m#L261
loadjson('{"root": [dir]}') executes Matlab code dir...
loadjson('{"root": [system(...)]}') executes system commands!!!
Loading the file below will launch notepad.exe... (remove .log extension)
vuln_test.json.log
The text was updated successfully, but these errors were encountered: