11 lines
No EOL
437 B
Text
11 lines
No EOL
437 B
Text
source: https://www.securityfocus.com/bid/58450/info
|
|
|
|
fastreader is prone to a remote command-execution vulnerability because the application fails to sufficiently sanitize user-supplied input.
|
|
|
|
An attacker may leverage this issue to execute arbitrary commands in the context of the affected application.
|
|
|
|
fastreader 1.0.8 is affected; other versions may also be vulnerable.
|
|
|
|
The following example URI is available:
|
|
|
|
http://www.g;id;.com |