[ 
https://issues.apache.org/jira/browse/IO-461?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14378520#comment-14378520
 ] 

Bernd Eckenfels commented on IO-461:
------------------------------------

Just for the record, openProcessStream(String[] params) forwards the String 
array 1:1 to Runtime.getRuntime().exec(params), so this API is as dangerous or 
not dangerous to use like the normal system class. Iff there is a vulnerability 
then it is in the application code. (there are executor frameworks which are 
doing much more wrong :) 

> Veracode scan detected OS command injection vulnerability in 
> commons-io-1.2.jar - FileSystemUtils.java:357
> ----------------------------------------------------------------------------------------------------------
>
>                 Key: IO-461
>                 URL: https://issues.apache.org/jira/browse/IO-461
>             Project: Commons IO
>          Issue Type: Bug
>    Affects Versions: 1.2
>            Reporter: Arkadeep Kundu
>
> Commons IO is embedded in EMC Corporation's DFS 6.7SP1.
> We performed Veracode scan for DFS 6.7SP1 and scan reported that code in 
> commons-io-1.2.jar - FileSystemUtils.java:357 (no further details) is 
> POSSIBLY vulnerable for OS command injection attacks.
> Need update on this from Apache side.
> It it really vulnerable? if yes, is it fixed in some future version?



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to