如何在Windows上安全地转义cmd.exe Shell的命令行参数?

如何在Windows上安全地转义cmd.exe Shell的命令行参数?,第1张

如何在Windows上安全地转义cmd.exe Shell的命令行参数

引用Windows命令行的问题在于,有两个受引用影响的分层解析引擎。首先,有

cmd.exe
解释某些特殊字符的Shell(例如)。然后,有一个调用程序解析命令行。
CommandLineToArgvW
Windows提供的功能经常会发生这种情况,但并非总是如此。

就是说,对于一般情况,例如,使用

cmd.exe
与程序一起解析其命令行的程序
CommandLineToArgvW
,您可以使用Daniel
Colascione在《每个人都用错误的方式引号命令行参数》中描述的技术。我最初尝试将其适应Ruby,现在尝试将其转换为python。

import redef escape_argument(arg):    # Escape the argument for the cmd.exe shell.    # See http://blogs.msdn.com/b/twistylittlepassagesallalike/archive/2011/04/23/everyone-quotes-arguments-the-wrong-way.aspx    #    # First we escape the quote chars to produce a argument suitable for    # CommandLineToArgvW. We don't need to do this for simple arguments.    if not arg or re.search(r'(["s])', arg):        arg = '"' + arg.replace('"', r'"') + '"'    return escape_for_cmd_exe(arg)def escape_for_cmd_exe(arg):    # Escape an argument string to be suitable to be passed to    # cmd.exe on Windows    #    # This method takes an argument that is expected to already be properly    # escaped for the receiving program to be properly parsed. This argument    # will be further escaped to pass the interpolation performed by cmd.exe    # unchanged.    #    # Any meta-characters will be escaped, removing the ability to e.g. use    # redirects or variables.    #    # @param arg [String] a single command line argument to escape for cmd.exe    # @return [String] an escaped string suitable to be passed as a program    #   argument to cmd.exe    meta_chars = '()%!^"<>&|'    meta_re = re.compile('(' + '|'.join(re.escape(char) for char in list(meta_chars)) + ')')    meta_map = { char: "^%s" % char for char in meta_chars }    def escape_meta_chars(m):        char = m.group(1)        return meta_map[char]    return meta_re.sub(escape_meta_chars, arg)

应用此代码,您应该能够成功转义cmd.exe Shell的参数。

print escape_argument('''some arg with spaces''')# ^"some arg with spaces^"

请注意,该方法应引用单个完整参数。如果要从多个来源收集参数,例如,通过构建一串python代码以传递给python命令,则必须在将其传递给之前对其进行汇编

escape_argument

import osCMD = '''string with spaces and &weird^ charcters!'''os.system('python -c "import sys; print(sys.argv[1])" {0}'.format(escape_argument(CMD)))# string with spaces and &weird^ charcters!


欢迎分享,转载请注明来源:内存溢出

原文地址: http://outofmemory.cn/zaji/5655522.html

(0)
打赏 微信扫一扫 微信扫一扫 支付宝扫一扫 支付宝扫一扫
上一篇 2022-12-16
下一篇 2022-12-16

发表评论

登录后才能评论

评论列表(0条)

保存