You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
### Bash arithmetic evaluation in RewriteMap/CGI-style scripts
53
+
54
+
RewriteMap helpers written in **bash** sometimes push query params into globals and later compare them in **arithmetic contexts** (`[[ $a -gt $b ]]`, `$((...))`, `let`). Arithmetic expansion re-tokenizes the content, so attacker-controlled variable names or array references are expanded twice and can execute.
55
+
56
+
**Pattern seen in Ivanti EPMM RewriteMap helpers:**
- Look for the same helper under other prefixes (e.g., `/mifs/c/aftstore/fob/`).
77
+
- Arithmetic contexts treat unknown tokens as variable/array identifiers, so this bypasses simple metacharacter filters.
78
+
52
79
### Parameters
53
80
54
81
Here are the top 25 parameters that could be vulnerable to code injection and similar RCE vulnerabilities (from [link](https://twitter.com/trbughunters/status/1283133356922884096)):
0 commit comments