[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2012-5526Date: (C)2012-11-22   (M)2023-12-22


CGI.pm module before 3.63 for Perl does not properly escape newlines in (1) Set-Cookie or (2) P3P headers, which might allow remote attackers to inject arbitrary headers into responses from applications that use CGI.pm.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.0
Exploit Score: 10.0
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: NONE
Integrity: PARTIAL
Availability: NONE
  
Reference:
SECTRACK-1027780
SECUNIA-51457
SECUNIA-55314
BID-56562
DSA-2586
RHSA-2013:0685
USN-1643-1
http://www.openwall.com/lists/oss-security/2012/11/15/6
http://cpansearch.perl.org/src/MARKSTOS/CGI.pm-3.63/Changes
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
https://github.com/markstos/CGI.pm/pull/23
perl-cgipm-header-injection(80098)

CWE    1
CWE-16
OVAL    19
oval:org.secpod.oval:def:701086
oval:org.secpod.oval:def:302985
oval:org.secpod.oval:def:104383
oval:org.secpod.oval:def:104372
...

© SecPod Technologies