Skip to content

Instantly share code, notes, and snippets.

View Splint3r7's full-sized avatar
🎯
Focusing

Hassan Khan Yusufzai Splint3r7

🎯
Focusing
View GitHub Profile
@Splint3r7
Splint3r7 / rising-1.0.2-command-injection.md
Last active November 11, 2023 14:16
Command Injection Vulnerability in Rising 1.0.2
We can make this file beautiful and searchable if this error is corrected: No commas found in this CSV file in line 0.
domain
123rf.com
1stdibs.com
2u.com
ba.com
babylist.com
bananatag.com
baylor.edu
bbcgoodfood.com
bcm.edu
# this command will return instances where the child_process module is loaded.
# that module is generally a good signal that the application is shelling out
egrep -r --exclude-dir "node_modules" --include "*.js" --exclude "*.min.*" -e "require(\s*)\((\s*)'child_process'(\s*))" .
# this command will return instances where code is dynamically executed.
egrep -r --exclude-dir "node_modules" --include "*.js" --exclude "*.min.*" -e "eval(\s*)\(" .
# this command will check common dangerous functions and report when strings are arguments
egrep -r --exclude-dir "node_modules" --include "*.js" --exclude "*.min.*" -e "(setInterval|setTimeout|new(\s*)Function)(\s*)\((\s*)\".*\"" .