Prodder before 0.5, and perlpodder before 0.5, allows remote attackers to execute arbitrary code via shell metacharacters in the URL of a podcast (url attribute of an enclosure tag, or $enc_url variable), which is executed when running wget.
Get an AI-powered plain-language explanation of this vulnerability and remediation steps.
Login to generate AI explanation26 reference(s) from NVD