[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2006-2548Date: (C)2006-05-23   (M)2023-12-22


Prodder before 0.5, and perlpodder before 0.5, allows remote attackers to execute arbitrary code via shell metacharacters in the URL of a podcast (url attribute of an enclosure tag, or $enc_url variable), which is executed when running wget.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 7.5
Exploit Score: 10.0
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
BID-18068
http://www.securityfocus.com/archive/1/434712/100/0/threaded
SECUNIA-20208
SECUNIA-20238
OSVDB-25690
SREASON-942
ADV-2006-1905
http://sourceforge.net/project/shownotes.php?release_id=418189&group_id=148643
http://www.redteam-pentesting.de/advisories/rt-sa-2006-002.php
http://www.redteam-pentesting.de/advisories/rt-sa-2006-003.php
perlpodder-dlset-command-execution(26575)
prodder-encurl-command-execution(26568)

CWE    1
CWE-94

© SecPod Technologies