Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fwmf-9cw3-w3x3

Опубликовано: 30 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

suidperl (aka sperl) does not properly cleanse the escape sequence "~!" before calling /bin/mail to send an error report, which allows local users to gain privileges by setting the "interactive" environmental variable and calling suidperl with a filename that contains the escape sequence.

suidperl (aka sperl) does not properly cleanse the escape sequence "~!" before calling /bin/mail to send an error report, which allows local users to gain privileges by setting the "interactive" environmental variable and calling suidperl with a filename that contains the escape sequence.

EPSS

Процентиль: 53%
0.00307
Низкий

Связанные уязвимости

redhat
почти 25 лет назад

suidperl (aka sperl) does not properly cleanse the escape sequence "~!" before calling /bin/mail to send an error report, which allows local users to gain privileges by setting the "interactive" environmental variable and calling suidperl with a filename that contains the escape sequence.

nvd
больше 24 лет назад

suidperl (aka sperl) does not properly cleanse the escape sequence "~!" before calling /bin/mail to send an error report, which allows local users to gain privileges by setting the "interactive" environmental variable and calling suidperl with a filename that contains the escape sequence.

EPSS

Процентиль: 53%
0.00307
Низкий