Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2015-8607

Опубликовано: 13 янв. 2016
Источник: nvd
CVSS3: 7.3
CVSS2: 7.5
EPSS Низкий

Описание

The canonpath function in the File::Spec module in PathTools before 3.62, as used in Perl, does not properly preserve the taint attribute of data, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
Конфигурация 2
cpe:2.3:a:perl:pathtools:*:*:*:*:*:*:*:*
Версия до 3.61 (включая)
Конфигурация 3
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

EPSS

Процентиль: 90%
0.05664
Низкий

7.3 High

CVSS3

7.5 High

CVSS2

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 7.3
ubuntu
около 10 лет назад

The canonpath function in the File::Spec module in PathTools before 3.62, as used in Perl, does not properly preserve the taint attribute of data, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.

redhat
около 10 лет назад

The canonpath function in the File::Spec module in PathTools before 3.62, as used in Perl, does not properly preserve the taint attribute of data, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.

CVSS3: 7.3
debian
около 10 лет назад

The canonpath function in the File::Spec module in PathTools before 3. ...

CVSS3: 7.3
github
больше 3 лет назад

The canonpath function in the File::Spec module in PathTools before 3.62, as used in Perl, does not properly preserve the taint attribute of data, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.

EPSS

Процентиль: 90%
0.05664
Низкий

7.3 High

CVSS3

7.5 High

CVSS2

Дефекты

CWE-20