Open pavreh opened 6 years ago
Ini file can be stored in the home folder and changed by the app or by user as needed without the root privileges. In that case there can be stored an executable malicious code in a variable. The code is executed when it is read by the parser.
I reworked this expected failed test into https://github.com/albfan/bash-ini-parser/tree/wip/executable-code
Ini file can be stored in the home folder and changed by the app or by user as needed without the root privileges. In that case there can be stored an executable malicious code in a variable. The code is executed when it is read by the parser.