mirror of
https://github.com/qbittorrent/qBittorrent
synced 2025-07-16 02:03:07 -07:00
Hacked qbt instances may contain malicious script placed in Run External Program and the script will attempt to hide itself by adding a lot whitespaces at the start of the command string. Users may mistake the field of being empty but is actually not. So trim the leading whitespaces to easily expose the malicious script. Note that GUI already trim the fields and only WebAPI doesn't trim them. This patch will unify the behavior. Related: https://github.com/qbittorrent/docker-qbittorrent-nox/issues/71#issuecomment-2993567440 |
||
---|---|---|
.. | ||
app | ||
base | ||
gui | ||
icons | ||
lang | ||
searchengine | ||
webui | ||
CMakeLists.txt | ||
qbittorrent.exe.manifest | ||
qbittorrent.rc | ||
qbittorrent_mingw.rc |