Command injection is an injection technique by which a set of arbitrary commands on the host operating system through a vulnerable application to attack the system. This type of attack is possible when a web application passes unsafe user-supplied data to a system shell. This includes forms, cookies, HTTP headers etc. In this attack, the operating system commands sent by the attacker is executed with the execution privileges of the vulnerable application. This type of attacks is largely due to insufficient input validation.
There are servers having a vulnerability that can cause Bash code injection vulnerability. This vulnerability can allow an attacker to execute malicious code using a custom environment. The Server side scripts allow bash to run in the background. This allows the vulnerability to be exploited remotely over the network. This may lead to severe damage to the server.
The impact include:-
Beagle recommends the following fixes:-