OS Command Injection in mitmproxy - #VU27048
Published: April 21, 2020
mitmproxy
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.
The vulnerability exists due to the command generated by "export.clip curl @focus" or "export.file curl @Focus /path/to/file" is not properly escaped. A remote unauthenticated attacker can execute arbitrary OS commands on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.