injection fix using shell=false and directly passing args#45690
Open
ayushhgarg-work wants to merge 5 commits intoAzure:mainfrom
Open
injection fix using shell=false and directly passing args#45690ayushhgarg-work wants to merge 5 commits intoAzure:mainfrom
ayushhgarg-work wants to merge 5 commits intoAzure:mainfrom
Conversation
Contributor
There was a problem hiding this comment.
Pull request overview
This PR updates the local endpoints CLI helper to mitigate command-injection risk by avoiding shell=True and executing subprocesses via an argv list.
Changes:
- Switch
run_cli_commandfromshell=True+ joined string commands toshell=False+ argv list execution. - Update CLI command logging to print a joined representation of argv instead of the prior
command_to_executestring.
You can also share your feedback on Copilot code review. Take the survey.
sdk/ml/azure-ai-ml/azure/ai/ml/_local_endpoints/utilities/commandline_utility.py
Outdated
Show resolved
Hide resolved
sdk/ml/azure-ai-ml/azure/ai/ml/_local_endpoints/utilities/commandline_utility.py
Outdated
Show resolved
Hide resolved
sdk/ml/azure-ai-ml/azure/ai/ml/_local_endpoints/utilities/commandline_utility.py
Outdated
Show resolved
Hide resolved
sdk/ml/azure-ai-ml/azure/ai/ml/_local_endpoints/utilities/commandline_utility.py
Show resolved
Hide resolved
Contributor
|
@ayushhgarg-work please read the following Contributor License Agreement(CLA). If you agree with the CLA, please reply with the following information.
Contributor License AgreementContribution License AgreementThis Contribution License Agreement (“Agreement”) is agreed to by the party signing below (“You”),
|
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Description
What
Fix command injection vulnerability (CWE-94) in
commandline_utility.pyby removingunsafe
shell=True+ string-join pattern.Related: MSRC Case 106104 (Moderate - Remote Code Execution)
Why
The
run_cli_commandfunction previously joined command arguments into a single stringvia
" ".join(cmd_arguments)and executed it withsubprocess.check_output(..., shell=True).This allowed shell metacharacters in user-controlled input (e.g.,
scoring_scriptpathin a deployment YAML) to break out of the command and execute arbitrary code.
Changes
shell=Falsewith argv list — shell metacharacters are never interpretedsubprocess.list2cmdline()for safe quoting before shell execution,since many CLI tools (e.g.,
code) are.cmd/.batshims that require shell executionshell=True+ join approachrun_cli_commandcovering:Testing
&,;,|are safely quotedand do not result in command injection