Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-8607

Опубликовано: 11 янв. 2016
Источник: redhat
CVSS2: 4.3
EPSS Низкий

Описание

The canonpath function in the File::Spec module in PathTools before 3.62, as used in Perl, does not properly preserve the taint attribute of data, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7perl-PathToolsNot affected
Red Hat Software Collectionsperl516-perl-PathToolsNot affected
Red Hat Software Collectionsrh-perl520-perl-PathToolsWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1293272perl-PathTools: Taint propagation flaw in canonpath()

EPSS

Процентиль: 90%
0.05664
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

CVSS3: 7.3
ubuntu
около 10 лет назад

The canonpath function in the File::Spec module in PathTools before 3.62, as used in Perl, does not properly preserve the taint attribute of data, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.

CVSS3: 7.3
nvd
около 10 лет назад

The canonpath function in the File::Spec module in PathTools before 3.62, as used in Perl, does not properly preserve the taint attribute of data, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.

CVSS3: 7.3
debian
около 10 лет назад

The canonpath function in the File::Spec module in PathTools before 3. ...

CVSS3: 7.3
github
больше 3 лет назад

The canonpath function in the File::Spec module in PathTools before 3.62, as used in Perl, does not properly preserve the taint attribute of data, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.

EPSS

Процентиль: 90%
0.05664
Низкий

4.3 Medium

CVSS2