Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Unsafe shell command constructed from library input #1239

Merged
merged 3 commits into from
Jan 23, 2025

Conversation

PhilipsonJoseph
Copy link
Contributor

Description: In the existing code we used to form the command by concat the strings which is not safe. So as a fix added a shell-quote package to escape the input before forming the command.

Documentation changes required: (Y/N)

Added unit tests: (Y/N)

Attached related issue: (Y/N) #https://dev.azure.com/mseng/AzureDevOps/_workitems/edit/2236220

Checklist:

  • Version was bumped - please check that version of the extension, task or library has been bumped.
  • Checked that applied changes work as expected.

v-bkasu and others added 2 commits January 9, 2025 18:09
…constructed from library input (in Extensions/Ansible/Src/Tasks/Ansible/ansibleCommandLineInterface.ts)
@PhilipsonJoseph PhilipsonJoseph merged commit 6606995 into master Jan 23, 2025
4 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants