CPANSA-Net-Ping-External-2008-7319: Net-Ping-External vulnerability

Publisher giterlizzi Document category csaf_security_advisory
Initial release date 2017-11-07T00:00:00 Engine CSAF Perl Toolkit 0.25
Current release date 2017-11-07T00:00:00 Build Date
Current version 1 Status final
CVSS v3.1 Base Score 9.8 Severity Critical
Original language Language en
Also referred to

Vulnerability Description

The Net::Ping::External extension through 0.15 for Perl does not properly sanitize arguments (e.g., invalid hostnames) containing shell metacharacters before use of backticks in External.pm, allowing for shell command injection and arbitrary command execution if untrusted input is used.

Vulnerabilities

CVE-2008-7319

Vulnerability Description

The Net::Ping::External extension through 0.15 for Perl does not properly sanitize arguments (e.g., invalid hostnames) containing shell metacharacters before use of backticks in External.pm, allowing for shell command injection and arbitrary command execution if untrusted input is used.

Weakness CWE-77 : Improper Neutralization of Special Elements used in a Command ('Command Injection')

Product status

Known affected
Product Score
Net-Ping-External less than or equal 0.15
CVSS Version CVSS Vector CVSS Base Score CVSS Base Severity
3.0 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 9.8 Critical
2.0 AV:N/AC:L/Au:N/C:C/I:C/A:C 10.0 High

giterlizzi

Namespace: https://github.com/giterlizzi/

gdt@cpan.org

References

Revision history

Version Date of the revision Summary of the revision
1 Tue Nov 7 00:00:00 2017 First release

Sharing rules

TLP:WHITE
For the TLP version see: https://www.first.org/tlp/