53 lines
1.3 KiB
Plaintext
Raw Permalink Normal View History

2020-06-30 12:49:37 +02:00
include::../description.adoc[]
include::../ask-yourself.adoc[]
include::../recommended.adoc[]
== Sensitive Code Example
----
public void SensitiveExample() {
String cmd="file.exe";
var startInfo = new ProcessStartInfo();
startInfo.FileName = cmd; // Sensitive: file.exe will be search in PATH directories
}
----
== Compliant Solution
2022-02-04 17:28:24 +01:00
[source,csharp]
2020-06-30 12:49:37 +02:00
----
public void CompliantExample() {
String cmd="/usr/bin/file.exe";
var startInfo = new ProcessStartInfo();
startInfo.FileName = cmd; // Compliant
}
----
include::../see.adoc[]
ifdef::env-github,rspecator-view[]
'''
== Implementation Specification
(visible only on this page)
include::../message.adoc[]
'''
== Comments And Links
(visible only on this page)
=== on 16 Oct 2018, 11:27:12 Nicolas Harraudeau wrote:
*Implementation details*
The example shows two ways of setting ``++ProcessStartInfo.FileName++``, either directly or via the ``++StartInfo++`` attribute of a newly created ``++Process++``. From the analysis point of view this is the same as ``++Process.StartInfo++`` is a ``++ProcessStartInfo++``.
=== on 9 May 2019, 15:11:54 Nicolas Harraudeau wrote:
This rule is deprecated for C# because the taint analysis engine already covers command injection (RSPEC-2076).
include::../comments-and-links.adoc[]
endif::env-github,rspecator-view[]