6.8
CVSSv2

CVE-2007-5837

Published: 05/11/2007 Updated: 29/07/2017
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 685
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

GUI.pm in yarssr 0.2.2, when Gnome default URL handling is disabled, allows remote malicious users to execute arbitrary commands via shell metacharacters in a link element in a feed.

Vulnerable Product Search on Vulmon Subscribe to Product

yarssr yarssr 0.2.2

Vendor Advisories

Duncan Gilmore discovered that yarssr, an RSS aggregator and reader, performs insufficient input sanitising, which could result in the execution of arbitrary shell commands if a malformed feed is read Due to a technical limitation of the archive management scripts, the fix for the old stable distribution (sarge) needs to be postponed by a few days ...

Exploits

source: wwwsecurityfocuscom/bid/26273/info Yarssr is prone to a remote code-injection vulnerability because it fails to properly sanitize user-supplied input An attacker can exploit this issue to inject and execute arbitrary malicious Perl code with the privileges of the user running the application Successful exploits can compromise the a ...