Closed lifenautjoe closed 3 years ago
hey @lifenautjoe ,
thanks for the report :) after having a second look I realised, that this "can't" be avoided, since we have to use the subprocess module in order to be able to call ffmpeg
.
Hi @escaped , sorry for the late reply but we could avoid this by sanitising the allowed parameters that can be run and the filenames.
Right now, with a malicious filename, I can get code execution in the video processing machine.
actually, we can fix all this by using this wrapper library instead of using subprocess directly.
https://github.com/kkroening/ffmpeg-python
It sanitizes input and restricts possible params.
Hi!
Ran the security linter bandit ( https://pypi.org/project/bandit/ ) through this package and found 2 issues that might be worth looking into