Injection attack possibility in kafka.py.
k-wall opened this issue · 3 comments
k-wall commented
Currently this library doesn't guard against the injection attacks. For instance, a malicious user could pass in a specially crafted kafka instance name or topic name (containing a white space) to cause undesired execution effects. Best practice tells us we should always code to avoid this possibility.
Building the cmd arrays explicitly, rather than splitting on whitespace, would be one possible resolution.
feichashao commented
Thank you for raising the issue! Given the PR is merged, are we good to close this issue?