CVE-2008-7319

The Net::Ping::External extension through 0.15 for Perl does not properly sanitize arguments (e.g., invalid hostnames) containing shell metacharacters before use of backticks in External.pm, allowing for shell command injection and arbitrary command execution if untrusted input is used.
References
Link Resource
https://rt.cpan.org/Public/Bug/Display.html?id=33230 Issue Tracking Third Party Advisory
https://bugs.debian.org/881097 Issue Tracking Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2017/11/07/4 Issue Tracking Mailing List Patch Third Party Advisory
http://matthias.sdfeu.org/devel/net-ping-external-cmd-injection.patch Issue Tracking Patch Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:net-ping-external_project:net-ping-external:*:*:*:*:*:perl:*:*

Information

Published : 2017-11-07 13:29

Updated : 2017-11-29 07:49


NVD link : CVE-2008-7319

Mitre link : CVE-2008-7319


JSON object : View

CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')

Advertisement

dedicated server usa

Products Affected

net-ping-external_project

  • net-ping-external