TestRail CLI FieldsParser eval Injection

Discussion in 'News Aggregator' started by Packet Storm, 8 Nov 2024.

  1. Packet Storm

    Packet Storm Guest

    While parsing test result XML files with the TestRail CLI, the presence of certain TestRail-specific fields can cause untrusted data to flow into an eval() statement, leading to arbitrary code execution. In order to exploit this, an attacker would need to be able to cause the TestRail CLI to parse a malicious XML file. Normally an attacker with this level of control would already have other avenues of gaining code execution.

    Continue reading...
     

Share This Page

Loading...