aliasrobotics / RVD

Robot Vulnerability Database. An archive of robot vulnerabilities and bugs.
https://aliasrobotics.com
GNU General Public License v3.0
171 stars 31 forks source link

RVD#3292: Starting a process with a shell, possible injection detected, security i..., ./Firmware/Tools/sdlog2/geotagging.py:102 #3292

Closed rvd-bot closed 4 years ago

rvd-bot commented 4 years ago
id: 3292
title: 'RVD#3292: Starting a process with a shell, possible injection detected, security
  i..., ./Firmware/Tools/sdlog2/geotagging.py:102'
type: bug
description: HIGH confidence of HIGH severity bug. Starting a process with a shell,
  possible injection detected, security issue. ./Firmware/Tools/sdlog2/geotagging.py:102.
  See links for more info on the bug.
cwe: None
cve: None
keywords:
- bandit
- bug
- static analysis
- testing
- triage
- bug
- 'version: v1.7.0'
- 'robot component: PX4'
- components software
system: ''
vendor: null
severity:
  rvss-score: 0
  rvss-vector: ''
  severity-description: ''
  cvss-score: 0
  cvss-vector: ''
links:
- https://github.com/aliasrobotics/RVD/issues/3292
- https://bandit.readthedocs.io/en/latest/plugins/b605_start_process_with_a_shell.html
flaw:
  phase: testing
  specificity: subject-specific
  architectural-location: application-specific
  application: N/A
  subsystem: N/A
  package: N/A
  languages: None
  date-detected: 2020-06-30 (10:50)
  detected-by: Alias Robotics
  detected-by-method: testing static
  date-reported: 2020-06-30 (10:50)
  reported-by: Alias Robotics
  reported-by-relationship: automatic
  issue: https://github.com/aliasrobotics/RVD/issues/3292
  reproducibility: always
  trace: ./Firmware/Tools/sdlog2/geotagging.py:102
  reproduction: See artifacts below (if available)
  reproduction-image: ''
exploitation:
  description: ''
  exploitation-image: ''
  exploitation-vector: ''
  exploitation-recipe: ''
mitigation:
  description: ''
  pull-request: ''
  date-mitigation: ''