The Net::Ping::External extension through 0.15 for Perl does not properly sanitize arguments (e.g., invalid hostnames) containing shell metacharacters before use of backticks in External.pm, allowing for shell command injection and arbitrary command execution if untrusted input is used.
References
Link | Resource |
---|---|
http://matthias.sdfeu.org/devel/net-ping-external-cmd-injection.patch | Issue Tracking Patch Third Party Advisory |
http://www.openwall.com/lists/oss-security/2017/11/07/4 | Issue Tracking Mailing List Patch Third Party Advisory |
https://bugs.debian.org/881097 | Issue Tracking Patch Third Party Advisory |
https://rt.cpan.org/Public/Bug/Display.html?id=33230 | Issue Tracking Third Party Advisory |
http://matthias.sdfeu.org/devel/net-ping-external-cmd-injection.patch | Issue Tracking Patch Third Party Advisory |
http://www.openwall.com/lists/oss-security/2017/11/07/4 | Issue Tracking Mailing List Patch Third Party Advisory |
https://bugs.debian.org/881097 | Issue Tracking Patch Third Party Advisory |
https://rt.cpan.org/Public/Bug/Display.html?id=33230 | Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 00:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://matthias.sdfeu.org/devel/net-ping-external-cmd-injection.patch - Issue Tracking, Patch, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2017/11/07/4 - Issue Tracking, Mailing List, Patch, Third Party Advisory | |
References | () https://bugs.debian.org/881097 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://rt.cpan.org/Public/Bug/Display.html?id=33230 - Issue Tracking, Third Party Advisory |
Information
Published : 2017-11-07 21:29
Updated : 2024-11-21 00:58
NVD link : CVE-2008-7319
Mitre link : CVE-2008-7319
CVE.ORG link : CVE-2008-7319
JSON object : View
Products Affected
net-ping-external_project
- net-ping-external
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')