Описание
Prodder before 0.5, and perlpodder before 0.5, allows remote attackers to execute arbitrary code via shell metacharacters in the URL of a podcast (url attribute of an enclosure tag, or $enc_url variable), which is executed when running wget.
Ссылки
- PatchVendor Advisory
- Patch
- ExploitPatchVendor Advisory
- ExploitPatchVendor Advisory
- ExploitPatch
- Vendor Advisory
- PatchVendor Advisory
- Patch
- ExploitPatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 0.4 (включая)Версия до 0.4 (включая)
Одно из
cpe:2.3:a:perlpodder:perlpodder:*:*:*:*:*:*:*:*
cpe:2.3:a:perlpodder:perlpodder:0.2:*:*:*:*:*:*:*
cpe:2.3:a:perlpodder:perlpodder:0.3:*:*:*:*:*:*:*
cpe:2.3:a:prodder:prodder:*:*:*:*:*:*:*:*
cpe:2.3:a:prodder:prodder:0.3:*:*:*:*:*:*:*
EPSS
Процентиль: 97%
0.3315
Средний
7.5 High
CVSS2
Дефекты
CWE-94
Связанные уязвимости
github
почти 4 года назад
Prodder before 0.5, and perlpodder before 0.5, allows remote attackers to execute arbitrary code via shell metacharacters in the URL of a podcast (url attribute of an enclosure tag, or $enc_url variable), which is executed when running wget.
EPSS
Процентиль: 97%
0.3315
Средний
7.5 High
CVSS2
Дефекты
CWE-94