Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Sun, 01 Feb 2015 14:42:20 +0100
From: Felix Eckhofer <>
Subject: Re: RCE, XSS and HTTP header injection in fli4l web interface


Am 01.02.2015 04:05, schrieb
> For the "execute arbitrary programs" issues, can you provide specific
> names for the vulnerability types, or any equivalent information?
> Examples of vulnerability types can be found on the
> and
> web sites.

Thank you for your response and sorry for the inaccurate description. In 
both cases user-supplied strings are used in an expression which is 
later passed to /bin/sh's eval. So I would classify both as Command 
Injection (

Best Regards

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.