CVE-2006-2548
Published May 23, 2006
Last updated 6 years ago
Overview
- Description
- Prodder before 0.5, and perlpodder before 0.5, allows remote attackers to execute arbitrary code via shell metacharacters in the URL of a podcast (url attribute of an enclosure tag, or $enc_url variable), which is executed when running wget.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-94
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:perlpodder:perlpodder:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2ABE3ADD-8789-43B5-B0CB-15E1EB1B4F0B", "versionEndIncluding": "0.4" }, { "criteria": "cpe:2.3:a:perlpodder:perlpodder:0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D418DFBE-6841-4503-9032-645778E213FE" }, { "criteria": "cpe:2.3:a:perlpodder:perlpodder:0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C8EEADA-DFFE-46A9-951C-AA3C60BEB953" }, { "criteria": "cpe:2.3:a:prodder:prodder:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4053C6B4-6FC5-4936-89C8-5057851529B7", "versionEndIncluding": "0.4" }, { "criteria": "cpe:2.3:a:prodder:prodder:0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B7B3C8E-DF1C-427D-AAFF-2B5BA8C8446F" } ], "operator": "OR" } ] } ]