Command Injection

  • CAPEC 88
  • CWE 78
  • PCI 3.2-6.5.1
  • WASC 31
  • OWASP 2013-A1

Command injection is an attack in which the goal is execution of arbitrary commands on the host operating system via a vulnerable application. Command injection attacks are possible when an application passes unsafe user supplied data (forms, cookies, HTTP headers etc.) to a system shell. In this attack, the attacker-supplied operating system commands are usually executed with the privileges of the vulnerable application.


Developer should scrub all input for malicious characters. Typically, it is much easier to define the legal characters than the illegal ones.