Skip to content

Conversation

@pavreh
Copy link
Contributor

@pavreh pavreh commented May 27, 2018

Ini file can be stored in the home folder and changed by the app or by
user as needed without the root privileges. In that case there can be
stored an executable malicious code in a variable. The code is executed
when it is read by the parser.

Ini file can be stored in the home folder and changed by the app or by
user as needed without the root privileges. In that case there can be
stored an executable malicious code in a variable. The code is executed
when it is read by the parser.
@albfan
Copy link
Owner

albfan commented May 27, 2018

I reworked this expected failed test into https://github.com/albfan/bash-ini-parser/tree/wip/executable-code

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants