Commit 050f71d
Fix OS command injection in ForkCurl consumer
The User-Agent header values (library name and version) from message
context were interpolated directly into a shell command without escaping,
allowing arbitrary command execution. Apply escapeshellarg() to the
User-Agent header and URL, consistent with how payload and secret are
already handled.
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>1 parent 7c99324 commit 050f71d
1 file changed
Lines changed: 2 additions & 2 deletions
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
53 | 53 | | |
54 | 54 | | |
55 | 55 | | |
56 | | - | |
| 56 | + | |
57 | 57 | | |
58 | 58 | | |
59 | 59 | | |
| |||
67 | 67 | | |
68 | 68 | | |
69 | 69 | | |
70 | | - | |
| 70 | + | |
71 | 71 | | |
72 | 72 | | |
73 | 73 | | |
| |||
0 commit comments