Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-53pj-vpxm-m333

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 7.3

Описание

The canonpath function in the File::Spec module in PathTools before 3.62, as used in Perl, does not properly preserve the taint attribute of data, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.

The canonpath function in the File::Spec module in PathTools before 3.62, as used in Perl, does not properly preserve the taint attribute of data, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.

EPSS

Процентиль: 90%
0.05664
Низкий

7.3 High

CVSS3

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 7.3
ubuntu
около 10 лет назад

The canonpath function in the File::Spec module in PathTools before 3.62, as used in Perl, does not properly preserve the taint attribute of data, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.

redhat
около 10 лет назад

The canonpath function in the File::Spec module in PathTools before 3.62, as used in Perl, does not properly preserve the taint attribute of data, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.

CVSS3: 7.3
nvd
около 10 лет назад

The canonpath function in the File::Spec module in PathTools before 3.62, as used in Perl, does not properly preserve the taint attribute of data, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.

CVSS3: 7.3
debian
около 10 лет назад

The canonpath function in the File::Spec module in PathTools before 3. ...

EPSS

Процентиль: 90%
0.05664
Низкий

7.3 High

CVSS3

Дефекты

CWE-20