π‘οΈ Sentinel: Fix shell injection vulnerabilities in entrypoint.sh #24
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
π‘οΈ Sentinel: Fix shell injection vulnerabilities in entrypoint.sh
π¨ Severity: HIGH
π‘ Vulnerability: Shell Command Injection / Argument Injection
The
copyables/entrypoint.shscript processed user input (USERS,VPNCMD_SERVER,VPNCMD_HUB) using unquoted variables andreadwithout-r.This allowed:
*to be expanded into filenames (globbing), causing unexpected behavior or information leakage.π§ Fix:
$usernameand$passwordinaddusercalls.-rto allreadcommands.VPNCMDcommand execution loops inset -fandset +fto safely allow word splitting (for command parsing) while preventing globbing.β Verification:
Added
tests/test_entrypoint_injection.shwhich mocks the environment and asserts that:*are passed literally and not expanded.Tests passed successfully.
PR created automatically by Jules for task 8426994037787046123 started by @bluPhy