Back to the previous page
| Test Case ID | 2035 |
| Bad / Good / Mixed | Good |
| Author | |
| Associations | Test suite: 58 |
| Added by | Michael Koo |
| Language | C++ |
| Type of test case | Source Code |
| Input string | |
| Expected Output | |
| Instructions | |
| Submission date | 2007-12-03 |
| Description | A software system that accepts and executes input in the form of operating system commands (e.g. system()) could allow an attacker with lesser privileges than the target software to execute commands with the elevated privileges of the executing process. |
| File(s) | |
| Flaw |
There are no comments
Have any comments on this test case? Please,
.
File Contains:
CWE-078: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') on line(s): 25
CWE-078: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') on line(s): 25

