lang:

PHP

regex:

expect_popen\s?\(

description:

Execute command via Bourne shell, and open the PTY stream to the process. Ensure no user controlled data is passed to this function.
tags:
dangerous function command execution
results