StackHawk Documentation StackHawk Logo HawkDocs

No results found

Try different keywords or check your spelling

Search documentation

Find guides, API references, and more

esc
Back to Index

Remote OS Command Injection - Timing Based

Reference
Plugin ID: 90037 CWE: 78 High Active

Remediation

  1. Input validation: Implement strict input validation and sanitization for all user-supplied data.
  2. Use safe APIs: Avoid direct command execution and use parameterized APIs, libraries, or safe alternatives.
  3. Command filtering: If command execution is necessary, use strict allowlists for permitted commands and arguments.
  4. Principle of least privilege: Run applications with minimal required system privileges.
  5. Sandboxing: Implement application sandboxing to limit the impact of successful command injection.

About

Remote OS Command Injection occurs when applications accept untrusted input to build operating system commands without proper validation or sanitization. Attackers can inject malicious commands that execute with the application's privileges, potentially compromising the entire system.

Risks

Critical Command injection can lead to complete server compromise, allowing attackers to execute arbitrary commands, access sensitive data, install malware, pivot to other systems, and maintain persistent access to the infrastructure.

Your privacy settings

We use first and third party cookies to ensure that we give you the best experience on our website and in our products.