diff options
author | R. David Murray <rdmurray@bitdance.com> | 2010-11-12 00:38:41 (GMT) |
---|---|---|
committer | R. David Murray <rdmurray@bitdance.com> | 2010-11-12 00:38:41 (GMT) |
commit | f959b7feaa61117305180003c451458a8c572054 (patch) | |
tree | 69743a46a89b845b4058f5f800d8a720b136e15b /Doc | |
parent | 64a820b4a2a5a55561bf3200dc67068ea19ff2a1 (diff) | |
download | cpython-f959b7feaa61117305180003c451458a8c572054.zip cpython-f959b7feaa61117305180003c451458a8c572054.tar.gz cpython-f959b7feaa61117305180003c451458a8c572054.tar.bz2 |
Merged revisions 86419 via svnmerge from
svn+ssh://pythondev@svn.python.org/python/branches/py3k
........
r86419 | r.david.murray | 2010-11-11 19:35:31 -0500 (Thu, 11 Nov 2010) | 4 lines
#7950: add warning about security implications of shell=True to subprocess docs
Patch by Chris Rebert.
........
Diffstat (limited to 'Doc')
-rw-r--r-- | Doc/library/subprocess.rst | 18 |
1 files changed, 18 insertions, 0 deletions
diff --git a/Doc/library/subprocess.rst b/Doc/library/subprocess.rst index 7402ad5..c490203 100644 --- a/Doc/library/subprocess.rst +++ b/Doc/library/subprocess.rst @@ -75,6 +75,24 @@ This module defines one class called :class:`Popen`: Popen(['/bin/sh', '-c', args[0], args[1], ...]) + .. warning:: + + Executing shell commands that incorporate unsanitized input from an + untrusted source makes a program vulnerable to `shell injection + <http://en.wikipedia.org/wiki/Shell_injection#Shell_injection>`_, + a serious security flaw which can result in arbitrary command execution. + For this reason, the use of *shell=True* is **strongly discouraged** in cases + where the command string is constructed from external input:: + + >>> from subprocess import call + >>> filename = input("What file would you like to display?\n") + What file would you like to display? + non_existent; rm -rf / # + >>> call("cat " + filename, shell=True) # Uh-oh. This will end badly... + + *shell=False* does not suffer from this vulnerability; the above Note may be + helpful in getting code using *shell=False* to work. + On Windows: the :class:`Popen` class uses CreateProcess() to execute the child program, which operates on strings. If *args* is a sequence, it will be converted to a string using the :meth:`list2cmdline` method. Please note that |