You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Can static analysis of CVE-2022-41352 vulnerability be realized? The specific principle is that if pax program exists in the operating system, pax program is used; otherwise, cpio program is used to trigger the vulnerability,for example:
2. my($part, $tempdir, $archiver) = @_;
3. my $archiver_name = basename((split(' ',$archiver))[0]);
4. snmp_count("OpsDecBy\u${archiver_name}");
5. ll(4) && do_log(4,"Expanding archive %s, using %s",
6. $part->base_name,$archiver_name);
7. my $is_pax = $archiver_name =~ /^cpio/i ? 0 : 1;
Line 7 decides to use cpio or pax according to whether pax exists. I want to realize the detection of this feature code
The text was updated successfully, but these errors were encountered:
Can static analysis of CVE-2022-41352 vulnerability be realized? The specific principle is that if pax program exists in the operating system, pax program is used; otherwise, cpio program is used to trigger the vulnerability,for example:
2. my($part, $tempdir, $archiver) = @_;
3. my $archiver_name = basename((split(' ',$archiver))[0]);
4. snmp_count("OpsDecBy\u${archiver_name}");
5. ll(4) && do_log(4,"Expanding archive %s, using %s",
6. $part->base_name,$archiver_name);
7. my $is_pax = $archiver_name =~ /^cpio/i ? 0 : 1;
Line 7 decides to use cpio or pax according to whether pax exists. I want to realize the detection of this feature code
The text was updated successfully, but these errors were encountered: