Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-g4xf-44vp-f7mq

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Openwebmail in cPanel 5.0, when run using suid Perl, adds the directory in the SCRIPT_FILENAME environment variable to Perl's @INC include array, which allows local users to execute arbitrary code by modifying SCRIPT_FILENAME to reference a directory containing a malicious openwebmail-shared.pl executable.

Openwebmail in cPanel 5.0, when run using suid Perl, adds the directory in the SCRIPT_FILENAME environment variable to Perl's @INC include array, which allows local users to execute arbitrary code by modifying SCRIPT_FILENAME to reference a directory containing a malicious openwebmail-shared.pl executable.

EPSS

Процентиль: 19%
0.0006
Низкий

Связанные уязвимости

nvd
больше 21 года назад

Openwebmail in cPanel 5.0, when run using suid Perl, adds the directory in the SCRIPT_FILENAME environment variable to Perl's @INC include array, which allows local users to execute arbitrary code by modifying SCRIPT_FILENAME to reference a directory containing a malicious openwebmail-shared.pl executable.

EPSS

Процентиль: 19%
0.0006
Низкий