We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
1 parent 4341bf6 commit 566a39fCopy full SHA for 566a39f
2 files changed
src/client/client.c
@@ -34,6 +34,8 @@
34
#endif
35
#include <wolfssl/wolfcrypt/settings.h>
36
37
+#include <ctype.h>
38
+
39
#include <wolfssl/ssl.h>
40
41
#include <wolfclu/clu_header_main.h>
tests/client/client-test.sh
@@ -42,7 +42,7 @@ if [ -f "$INJFILE" ]; then
42
fi
43
44
# Command substitution: "$(touch clu_injection_probe.txt)" passed as peer
45
-./wolfssl s_client -connect '$(touch clu_injection_probe.txt):443' \
+./wolfssl s_client -connect 'evil$(touch clu_injection_probe.txt).com:443' \
46
2>/dev/null
47
if [ -f "$INJFILE" ]; then
48
echo "SECURITY FAILURE: command injection via hostname (command substitution)"
0 commit comments