Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Prompt Injection Leading to Remote Code Execution (RCE) via Unsanitized User Input URL #3

Open
bayegaspard opened this issue Sep 29, 2024 · 1 comment

Comments

@bayegaspard
Copy link

bayegaspard commented Sep 29, 2024

Screenshot 2024-09-29 112846 Prompt injection can lead to arbitrary Remote Code Execution (RCE) when user-supplied inputs, such as a URL, are not properly sanitized. In this example (./ffufai.py --max-extensions 5 -u https://hello.com`id`), the command injection occurs because the input (`id`) is being executed as part of the system command. This allows an attacker to run arbitrary commands on the system, like `id` (which displays user identity information), exploiting the input field's vulnerability to execute harmful actions. Proper input sanitization and validation can help prevent such attacks. Check the screenshot for a PoC.
@bayegaspard
Copy link
Author

who

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant