Any web app that relies on some kind of user input is potentially vulnerable to some kind of command injection, be it MySQL, NoSQL or OS command injection. Indeed, OWASP lists this as one of the topmost security risks.
  In a paper presented at VB2019 in London,
  
   Prismo Systems
  
  researchers Abhishek Singh and Ramesh Mani discussed code injection vulnerabilities and presented a tool that could detect this vulnerability class.
 
  
  
   Dynamic call graph with OS command injection exploit.
  
 
  Today we publish Abhishek and Ramesh’s paper in both
  
   HTML
  
  and
  
   PDF
  
  format. We have also uploaded the recording of their presentation at VB2019 in London to our
  
   YouTube
  
  channel.
 
   
   Catch me if you can: detection of injection exploitation by validating query and API integrity
  
   
    Read the paper (HTML)
   
  
   
    Download the paper (PDF)
   
  
  
   Did you see we have opened the
   
    Call for Papers
   
   for VB2020 in Dublin? Submit your abstract before 15 March for a chance to make it onto the programme of one of the most international threat intelligence conferences!
  
 
Leave a Reply