Hi Bernd! Yes, you are right. I tried subproccess a few years ago and I found something that was not working in what I need (i don't remember what). But I will try it again :) I will create another bug for that and I will give you a feedback.
I can't upload that change because It'll be complicate to asure the current GUI stability and for older versions I have to fix problems but I must not to make improvements. In other way, this bug was epic. I learned a lot about (not web PHP) injection. I want to thank you all the reports, tests and help!!! :) Really thank you!! Best regards!! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1410839 Title: Shell Command injection in ufw_backend.py To manage notifications about this bug go to: https://bugs.launchpad.net/gui-ufw/+bug/1410839/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs