CVE-2024-45321

The App::cpanminus package through 1.7047 for Perl downloads code via insecure HTTP, enabling code execution for network attackers.
Configurations

Configuration 1 (hide)

cpe:2.3:a:app\:\:cpanminus_project:app\:\:cpanminus:*:*:*:*:*:perl:*:*

History

06 Sep 2024, 22:30

Type Values Removed Values Added
First Time App\
App\ \
References () https://github.com/miyagawa/cpanminus/issues/611 - () https://github.com/miyagawa/cpanminus/issues/611 - Issue Tracking
References () https://github.com/miyagawa/cpanminus/pull/674 - () https://github.com/miyagawa/cpanminus/pull/674 - Issue Tracking, Patch
References () https://security.metacpan.org/2024/08/26/cpanminus-downloads-code-using-insecure-http.html - () https://security.metacpan.org/2024/08/26/cpanminus-downloads-code-using-insecure-http.html - Exploit, Third Party Advisory
CPE cpe:2.3:a:app\:\:cpanminus_project:app\:\:cpanminus:*:*:*:*:*:perl:*:*

06 Sep 2024, 14:35

Type Values Removed Values Added
CWE CWE-94 CWE-494

27 Aug 2024, 14:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-94

27 Aug 2024, 13:01

Type Values Removed Values Added
Summary
  • (es) El paquete App::cpanminus hasta 1.7047 para Perl descarga código a través de HTTP inseguro, lo que permite la ejecución de código para atacantes de red.

27 Aug 2024, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-27 04:15

Updated : 2024-09-06 22:30


NVD link : CVE-2024-45321

Mitre link : CVE-2024-45321

CVE.ORG link : CVE-2024-45321


JSON object : View

Products Affected

app\

  • \
CWE
CWE-494

Download of Code Without Integrity Check