The Net::Ping::External extension through 0.15 for Perl does not properly sanitize arguments (e.g., invalid hostnames) containing shell metacharacters before use of backticks in External.pm, allowing for shell command injection and arbitrary command execution if untrusted input is used.
References
Link | Resource |
---|---|
https://rt.cpan.org/Public/Bug/Display.html?id=33230 | Issue Tracking Third Party Advisory |
https://bugs.debian.org/881097 | Issue Tracking Patch Third Party Advisory |
http://www.openwall.com/lists/oss-security/2017/11/07/4 | Issue Tracking Mailing List Patch Third Party Advisory |
http://matthias.sdfeu.org/devel/net-ping-external-cmd-injection.patch | Issue Tracking Patch Third Party Advisory |
Configurations
Information
Published : 2017-11-07 13:29
Updated : 2017-11-29 07:49
NVD link : CVE-2008-7319
Mitre link : CVE-2008-7319
JSON object : View
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
Products Affected
net-ping-external_project
- net-ping-external