Skip to content

Replace unsafe eval() with getattr() in pod_network_outage_plugin. #1132

@shiavm006

Description

@shiavm006

A potential code execution vulnerability exists in pod_network_outage_plugin.py where eval() is used to dynamically access object attributes. This pattern can be exploited if the direction parameter contains malicious input.

A malicious scenario configuration file could potentially include crafted values in the direction field that, when processed by eval(), could execute arbitrary Python code.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions