Exploit foomatic-gui python-foomatic 0.7.9.4 - 'pysmb.py' Arbitrary Shell Command Execution

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
36013
Проверка EDB
  1. Пройдено
Автор
DAVEB
Тип уязвимости
REMOTE
Платформа
MULTIPLE
CVE
N/A
Дата публикации
2011-08-03
Код:
source: https://www.securityfocus.com/bid/48982/info

foomatic-gui is prone to a remote arbitrary shell-command-execution vulnerability because the application fails to properly sanitize user-supplied input.

An attacker can exploit this issue to execute arbitrary shell commands in the context of the application.

Versions prior to foomatic-gui 0.7.9.5 are vulnerable. 

netbios name = oh'notquotezSIF to /etc/samba/smb.conf
 
Источник
www.exploit-db.com

Похожие темы