зеркало из https://github.com/github/ruby.git
[DOC] Update command_injection.rdoc
- Add missing `Kernel.exec` and `Kernel.spawn`. - Elaborate arguments that can cause injections.
This commit is contained in:
Родитель
33290896dc
Коммит
4a11f50f79
|
@ -7,11 +7,17 @@ They should not be called with unknown or unsanitized commands.
|
|||
|
||||
These methods include:
|
||||
|
||||
- Kernel.exec
|
||||
- Kernel.spawn
|
||||
- Kernel.system
|
||||
- Kernel.open
|
||||
- {\`command` (backtick method)}[rdoc-ref:Kernel#`]
|
||||
(also called by the expression <tt>%x[command]</tt>).
|
||||
- IO.popen(command).
|
||||
- IO.popen (when called with other than <tt>"-"</tt>).
|
||||
|
||||
Some methods execute a system command only if the given path name starts
|
||||
with a <tt>|</tt>:
|
||||
|
||||
- Kernel.open(command).
|
||||
- IO.read(command).
|
||||
- IO.write(command).
|
||||
- IO.binread(command).
|
||||
|
@ -21,7 +27,7 @@ These methods include:
|
|||
- URI.open(command).
|
||||
|
||||
Note that some of these methods do not execute commands when called
|
||||
from subclass \File:
|
||||
from subclass +File+:
|
||||
|
||||
- File.read(path).
|
||||
- File.write(path).
|
||||
|
|
Загрузка…
Ссылка в новой задаче