The software builds all or a portion of a command using input that has been influenced externally from an upstream component, but it fails to neutralise or does so in a way that could cause the intended command to be changed when it is sent to a downstream component.
Command injection vulnerabilities typically occur when:
Data enters the application from an untrusted source.
The data is part of a string that is executed as a command by the application.
By executing the command, the application gives an attacker a privilege or capability that the attacker would not otherwise have.
Many protocols and products have their own custom command language. While OS or shell command strings are frequently discovered and targeted, developers may not realize that these other command languages might also be vulnerable to attacks.
Command injection is a common problem with wrapper programs.
This is a web utility for scanning IP address for open ports.
Can you use this utility for something other than scanning ports?