[Forgot Password]
Login  Register Subscribe

23631

 
 

126998

 
 

102010

 
 

909

 
 

80911

 
 

121

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2008-7319Date: (C)2017-11-08   (M)2018-02-19


The Net::Ping::External extension through 0.15 for Perl does not properly sanitize arguments (e.g., invalid hostnames) containing shell metacharacters before use of backticks in External.pm, allowing for shell command injection and arbitrary command execution if untrusted input is used.

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score  : 9.8CVSS Score  : 10.0
Exploit Score: 3.9Exploit Score: 10.0
Impact Score : 5.9Impact Score : 10.0
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: NONEAuthentication: NONE
User Interaction: NONEConfidentiality: COMPLETE
Scope: UNCHANGEDIntegrity: COMPLETE
Confidentiality: HIGHAvailability: COMPLETE
Integrity: HIGH 
Availability: HIGH 
  





Reference:
http://matthias.sdfeu.org/devel/net-ping-external-cmd-injection.patch
http://www.openwall.com/lists/oss-security/2017/11/07/4
https://bugs.debian.org/881097
https://rt.cpan.org/Public/Bug/Display.html?id=33230

CWE    1
CWE-77
OVAL    3
oval:org.secpod.oval:def:113580
oval:org.secpod.oval:def:113454
oval:org.secpod.oval:def:113466

© 2013 SecPod Technologies