CVE-2012-6142

Session::Cookie in the HTML::EP module 0.2011 for Perl does not properly use the Storable::thaw function, which allows remote attackers to execute arbitrary code via a crafted request, which is not properly handled when it is deserialized.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jochen_wiedmann:html\:\:ep:0.2011:*:*:*:*:perl:*:*

History

21 Nov 2024, 01:45

Type Values Removed Values Added
References () http://seclists.org/oss-sec/2013/q2/318 - () http://seclists.org/oss-sec/2013/q2/318 -
References () http://www.securityfocus.com/bid/59833 - () http://www.securityfocus.com/bid/59833 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/84199 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/84199 -

Information

Published : 2014-06-04 23:55

Updated : 2024-11-21 01:45


NVD link : CVE-2012-6142

Mitre link : CVE-2012-6142

CVE.ORG link : CVE-2012-6142


JSON object : View

Products Affected

jochen_wiedmann

  • html\
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')