[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2015-8607Date: (C)2016-02-11   (M)2023-12-22


The canonpath function in the File::Spec module in PathTools before 3.62, as used in Perl, does not properly preserve the taint attribute of data, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 7.3CVSS Score : 7.5
Exploit Score: 3.9Exploit Score: 10.0
Impact Score: 3.4Impact Score: 6.4
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: NONEAuthentication: NONE
User Interaction: NONEConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: PARTIAL
Confidentiality: LOWAvailability: PARTIAL
Integrity: LOW 
Availability: LOW 
  
Reference:
SECTRACK-1034772
BID-80504
DSA-3441
FEDORA-2016-4ca904238f
FEDORA-2016-69e506e02d
GLSA-201701-75
USN-2878-1
http://cpansearch.perl.org/src/RJBS/PathTools-3.62/Changes
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://rt.perl.org/Public/Bug/Display.html?id=126862
https://www.oracle.com/security-alerts/cpujul2020.html
openSUSE-SU-2016:0881

CPE    3
cpe:/o:canonical:ubuntu_linux:15.10
cpe:/o:canonical:ubuntu_linux:15.04
cpe:/o:debian:debian_linux:8.0
CWE    1
CWE-20
OVAL    6
oval:org.secpod.oval:def:602327
oval:org.secpod.oval:def:1800866
oval:org.secpod.oval:def:2100987
oval:org.secpod.oval:def:702942
...

© SecPod Technologies