The `omz_urldecode` function uses an eval to decode the input which can be exploited to inject commands. This is used only in the svn plugin and it requires a complex process to exploit, so it is highly unlikely to have been used by an attacker.master
parent
1448d234d6
commit
6cb41b70a6
1 changed files with 2 additions and 3 deletions
Loading…
Reference in new issue