source: http://www.securityfocus.com/bid/15213/info Snoopy is prone to a vulnerability that lets attackers execute arbitrary commands because the application fails to properly sanitize user-supplied input. This issue may facilitate unauthorized remote access to the application in the context of the webserver. https://www.%22;+echo+'hello'+%3E+test.txt Passing this URI to a script that uses a vulnerable version of Snoopy will result in a file called 'test.txt' containing 'hello'.
Related ExploitsTrying to match CVEs (1): CVE-2005-3330
Trying to match OSVDBs (1): 20316
Other Possible E-DB Search Terms: Snoopy 0.9x/1.0/1.2, Snoopy 0.9x, Snoopy
|2010-11-11||Electronic Arts SnoopyCtrl - ActiveX Control Buffer Overflow (Metasploit)||Metasploit|