Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-53jp-4vhp-x2vh

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The papd daemon in Netatalk before 2.0.4-beta2, when using certain variables in a pipe command for the print file, allows remote attackers to execute arbitrary commands via shell metacharacters in a print request, as demonstrated using a crafted Title.

The papd daemon in Netatalk before 2.0.4-beta2, when using certain variables in a pipe command for the print file, allows remote attackers to execute arbitrary commands via shell metacharacters in a print request, as demonstrated using a crafted Title.

EPSS

Процентиль: 82%
0.01824
Низкий

Дефекты

CWE-78

Связанные уязвимости

ubuntu
почти 17 лет назад

The papd daemon in Netatalk before 2.0.4-beta2, when using certain variables in a pipe command for the print file, allows remote attackers to execute arbitrary commands via shell metacharacters in a print request, as demonstrated using a crafted Title.

nvd
почти 17 лет назад

The papd daemon in Netatalk before 2.0.4-beta2, when using certain variables in a pipe command for the print file, allows remote attackers to execute arbitrary commands via shell metacharacters in a print request, as demonstrated using a crafted Title.

debian
почти 17 лет назад

The papd daemon in Netatalk before 2.0.4-beta2, when using certain var ...

EPSS

Процентиль: 82%
0.01824
Низкий

Дефекты

CWE-78