SECURITY: Unquoted curl URLs with variables in API calls #60
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Summary
Multiple
curlAPI calls use variable expansions without proper quoting, which could lead to URL manipulation or injection attacks if variables contain special characters.Locations
Several call sites in:
dev/dev-poll.sh(e.g. PR SHA lookup)dev/phase-handler.sh(multiple locations)curlcalls acrosslib/anddev/Risk
FORGE_APIor other URL variables are manipulated, could redirect API callsRecommended Fix
curlURLsapi_callwrapper inlib/env.shthat enforces quotingReferences
Upstream: codeberg johba/disinto#819