Skip to content

Notes about System.Diagnostics.Process

Paulino Calderon edited this page Jul 26, 2018 · 3 revisions

System.Diagnostics.Process is not vulnerable to code execution even when the parameters variable is not sanitized because shell characters are not interpreted internally. System.Diagnostics.Process safe from code execution

The only way you can make this function vulnerable is by setting the StartInfo.FileName value to 'cmd.exe': Code execution in System.Diagnostics.Process

Clone this wiki locally