Skip to content

fix: sanitize subprocess call in server.py#6275

Open
orbisai0security wants to merge 1 commit intogoogle-ai-edge:masterfrom
orbisai0security:fix-fix-v001-ssrf-subprocess-injection-youtube8m-server
Open

fix: sanitize subprocess call in server.py#6275
orbisai0security wants to merge 1 commit intogoogle-ai-edge:masterfrom
orbisai0security:fix-fix-v001-ssrf-subprocess-injection-youtube8m-server

Conversation

@orbisai0security
Copy link
Copy Markdown

Summary

Fix critical severity security issue in mediapipe/examples/desktop/youtube8m/viewer/server.py.

Vulnerability

Field Value
ID V-001
Severity CRITICAL
Scanner multi_agent_ai
Rule V-001
File mediapipe/examples/desktop/youtube8m/viewer/server.py:144
CWE CWE-78

Description: The YouTube8M viewer server passes user-influenced HTTP request parameters directly to subprocess.call() and subprocess.Popen() at lines 144, 155, and 181 without sanitization. The curl_arg value derived from HTTP input is passed as a raw argument to curl, enabling Server-Side Request Forgery (SSRF) and arbitrary file writes via curl flags (e.g., -o). If any call path uses shell=True, shell metacharacters in the input execute arbitrary OS commands.

Changes

  • mediapipe/examples/desktop/youtube8m/viewer/server.py

Verification

  • Build passes
  • Scanner re-scan confirms fix
  • LLM code review passed

Automated security fix by OrbisAI Security

Automated security fix generated by Orbis Security AI
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant