SiteShadow
Back to vulnerability library

CWE-77 Command Injection

What this means

SiteShadow flagged a pattern where untrusted input may be interpreted by a shell or command parser, allowing an attacker to alter the command being executed.

Why it matters

Attackers can run arbitrary system commands.

Safer examples

1) Don't build shell strings; pass arguments as arrays

import subprocess
subprocess.run(["git", "status"], check=True)

2) Avoid shell=True / shell execution

If you must use shell features, strictly allowlist inputs and isolate execution.

3) Use allowlists for user-controlled command choices

const allowed = new Set(["status", "version"]);
const cmd = allowed.has(req.query.cmd) ? req.query.cmd : "status";

How SiteShadow detects it (high level)

References

---

← Back to Vulnerability Library

Request access View coverage