-
Notifications
You must be signed in to change notification settings - Fork 76
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Issues with reading commands from file #903
Comments
Further to the problems with the 'read commands from file given as argument', it is actually is a local file inclusion vulnerability - should the user execute
Observe that Keeper executed the Implicitly reading commands from a file (or stdin for that matter) is a misfeature at best, security flaw at worst, and should be removed, reverting to using the explicit |
Yes, it was not a good idea to have both |
It's good that commander uses semantic versioning; the faulty behaviour can be deprecated now and removed in the next major release. (Though it seems the commander versioning is somehow tied to the broader keeper release numbering - which seems very odd - they're quite different codebases; sure version x.y of commander may be dependent on version n.m of the keeper API, but x.y and n.m are totally orthogonal), Anyway, leave that to you. |
keeper
can read commands from a file in at least three different ways (wherecmds
is a file containing keeper commands):keeper run-batch cmds
keeper cmds
keeper - < cmds
(requires a previously established persistent login sessionkeeper this-device persistent-login on
)The second approach is
keeper --help
run-batch
:Commander/keepercommander/commands/scripting.py
Line 85 in fb612e8
Commander/keepercommander/__main__.py
Line 240 in ada80f4
I suggest just deleting the option 2 (and 3) in its entirety. Executing commands from a file/stdin should be explicit.
The text was updated successfully, but these errors were encountered: