Open RevLaw opened 9 hours ago
The Perl line mention in the code is triggering the following tactic 'persistence via web shell'
https://github.com/pulsejet/memories/blob/98a12d240cb6e91243c60e87dd48572ff1fff719/lib/Service/BinExt.php#L463
I don't know how to fix this or if that is possible. But can you check the code if you can make the execution more secure? Probably, you can replace it with another command?
Install and run the plugin.
- OS: Docker - Oracle Linux - Browser: Chrome - Memories Version: 7.4.1 - Nextcloud Version: 31 - PHP Version: 8
No response
I don't know if that'll fix the warning, but these should definitely be using exec, not shell 👍🏻
Describe the bug
The Perl line mention in the code is triggering the following tactic 'persistence via web shell'
https://github.com/pulsejet/memories/blob/98a12d240cb6e91243c60e87dd48572ff1fff719/lib/Service/BinExt.php#L463
I don't know how to fix this or if that is possible. But can you check the code if you can make the execution more secure? Probably, you can replace it with another command?
Steps To Reproduce
Install and run the plugin.
Platform
Screenshots
Additional context
No response