Skip to content

loadstring vulnerability #3

@2dengine

Description

@2dengine

In your "string to table" function you are using setfenv which is good although I have read that it is possible to bypass this sort of sandboxing by loading Lua bytecode. In short, you may want to disallow loading strings containing bytecode if you plan to build a "high security" application:

    if stringtoload:byte(1) == 27 then
      return
    end

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions