Commix : Detecting and exploiting command injection flaws

@inproceedings{Stasinopoulos2015CommixD,
  title={Commix : Detecting and exploiting command injection flaws},
  author={Anastasios Stasinopoulos and Christoforos Ntantogian and Christos Xenakis},
  year={2015}
}
Command injections are prevalent to any application independently of its operating system that hosts the application or the programming language that the application itself is developed.The impact of command injection attacks ranges from loss of data confidentiality and integrity to unauthorized remote access to the system that hosts the vulnerable… CONTINUE READING