We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 9e553e4 commit ab5b840Copy full SHA for ab5b840
main.py
@@ -11,14 +11,14 @@
11
'http': 'http://test:pass@localhost:8080',
12
'https': 'http://test:pass@localhost:8090',
13
}
14
- url = 'http://example.com' # Replace with a valid URL
+ url = 'https://example.com' # Replace with a valid URL using HTTPS
15
req = requests.Request('GET', url)
16
prep = req.prepare()
17
session.rebuild_proxies(prep, proxies)
18
19
# Introduce a command injection vulnerability
20
user_input = input("Enter a command to execute: ")
21
- command = "ping " + user_input
22
- subprocess.call(command, shell=True)
+ command = ["ping", user_input]
+ subprocess.call(command, shell=False)
23
24
- print("Command executed!")
+ print("Command executed!")
0 commit comments