header-logo
Suggest Exploit
vendor:
foomatic-gui
by:
Unknown
7.5
CVSS
HIGH
Remote Arbitrary Shell Command Execution
Unknown
CWE
Product Name: foomatic-gui
Affected Version From: Versions prior to foomatic-gui 0.7.9.5
Affected Version To: Unknown
Patch Exists: YES
Related CWE: Unknown
CPE: a:foomatic:foomatic-gui
Metasploit:
Other Scripts:
Platforms Tested: Unknown
Unknown

foomatic-gui Remote Arbitrary Shell Command Execution Vulnerability

foomatic-gui is prone to a remote arbitrary shell-command-execution vulnerability because the application fails to properly sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary shell commands in the context of the application.

Mitigation:

Upgrade to foomatic-gui version 0.7.9.5 or later.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/48982/info

foomatic-gui is prone to a remote arbitrary shell-command-execution vulnerability because the application fails to properly sanitize user-supplied input.

An attacker can exploit this issue to execute arbitrary shell commands in the context of the application.

Versions prior to foomatic-gui 0.7.9.5 are vulnerable. 

netbios name = oh'notquotezSIF to /etc/samba/smb.conf