Closed archcloudlabs closed 8 years ago
Hi @jaredestroud !
This is certainly true. However, we never expected that these API would ever directly consume public, unfiltered input. As such, node-virtualbox
affords no protection against it.
It shouldn't really be the responsibility of node-virtualbox
to police input, because:
sudo rm -rf /
for some reason.We should therefore remain un-opinionated with regard to how the API is used.
Thank you for bringing this up. At the very least, I could add a note in the README to underline this behaviour for those who may not be aware.
the functions below in virtualbox.js, could allow for a user to inject additional commands with the cmd variable (ex: "; pwd") resulting in remote command execution assuming this was public facing.