Hey there!
During security reviews I discovered an issue in audioread/ffdec.py
The code uses subprocess.Popen to execute external commands (ffmpeg or avconv) with a user-provided filename as part of the command arguments. This creates a significant command injection vulnerability, as a malicious filename could contain arbitrary shell commands, leading to remote code execution on the system.
|
['-i', filename, '-f', 's16le', '-'], |
Hey there!
During security reviews I discovered an issue in audioread/ffdec.py
The code uses
subprocess.Popento execute external commands (ffmpegoravconv) with a user-providedfilenameas part of the command arguments. This creates a significant command injection vulnerability, as a malicious filename could contain arbitrary shell commands, leading to remote code execution on the system.audioread/audioread/ffdec.py
Line 144 in 577f8e2