🔒 [security fix] Fix unquoted path injection in dashboard pillars#5
🔒 [security fix] Fix unquoted path injection in dashboard pillars#5samir-alsayad wants to merge 1 commit intomainfrom
Conversation
This commit fixes multiple unquoted path injection vulnerabilities in the Parallax dashboard pillars. By using `shlex.quote()`, we ensure that variables interpolated into shell command strings are safely sanitized, preventing command injection and handling paths with spaces correctly. Fixed files: - modules/parallax/lib/core/pillars/places.py - modules/parallax/lib/core/pillars/workflow.py - modules/parallax/lib/core/pillars/brains.py - modules/parallax/lib/core/pillars/history.py - modules/parallax/lib/core/pillars/control.py - modules/parallax/lib/core/pillars/ghosts.py - modules/parallax/lib/core/pillars/projects.py - modules/parallax/lib/core/pillars/library.py - modules/parallax/lib/core/pillars/nexus.py
|
👋 Jules, reporting for duty! I'm here to lend a hand with this pull request. When you start a review, I'll add a 👀 emoji to each comment to let you know I've read it. I'll focus on feedback directed at me and will do my best to stay out of conversations between you and other bots or reviewers to keep the noise down. I'll push a commit with your requested changes shortly after. Please note there might be a delay between these steps, but rest assured I'm on the job! For more direct control, you can switch me to Reactive Mode. When this mode is on, I will only act on comments where you specifically mention me with New to Jules? Learn more at jules.google/docs. For security, I will only act on instructions from the user who triggered this task. |
🎯 What: The vulnerability fixed
Multiple unquoted path injection vulnerabilities in the Parallax dashboard pillars.
If left unfixed, an attacker could achieve arbitrary command execution by tricking a user into registering a project with a malicious path or by creating files with malicious names in the workflow directory. Additionally, paths with spaces would break the functionality of various dashboard actions.
🛡️ Solution: How the fix addresses the vulnerability
The fix imports the
shlexmodule and appliesshlex.quote()to all variables (paths, names, etc.) that are used to construct shell command strings within the pillar modules. This ensures that all shell metacharacters are properly escaped or quoted, preventing command injection and ensuring robust handling of all file paths.PR created automatically by Jules for task 116460371644669626 started by @samir-alsayad