cmssw
cmssw copied to clipboard
Potential Issue regarding Code Injection
In code here, it directly eval
the value from environment variable. A malicous local actor could set something like export ALIGNMENT_PHOTOGRAMMETRY='os.system("touch rickroll")'
to execute arbitrary commands. It would be better to use ast.literal_eval
here.
This issue is similar to CVE-2022-2054.