Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-36770

Опубликовано: 09 авг. 2021
Источник: redhat
CVSS3: 7.8

Описание

Encode.pm, as distributed in Perl through 5.34.0, allows local users to gain privileges via a Trojan horse Encode::ConfigLocal library (in the current working directory) that preempts dynamic module loading. Exploitation requires an unusual configuration, and certain 2021 versions of Encode.pm (3.05 through 3.11). This issue occurs because the || operator evaluates @INC in a scalar context, and thus @INC has only an integer value.

A flaw was found in perl-Encode, where the Perl5 Encode module loaded modules within the current directory. This flaw allows an attacker with write access to the current directory of a Perl5 process to inject arbitrary Perl code when this module is loaded, which can be used for a local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

Отчет

Red Hat Enterprise Linux 7 and 8 (including Software Collection) provide older versions of Perl and the Encode library, which are not affected by this flaw.

Меры по смягчению последствий

Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7perl-EncodeNot affected
Red Hat Enterprise Linux 8perl:5.30/perl-EncodeNot affected
Red Hat Enterprise Linux 8perl-EncodeNot affected
Red Hat Enterprise Linux 9perl-EncodeNot affected
Red Hat Software Collectionsrh-perl526-perl-EncodeNot affected
Red Hat Software Collectionsrh-perl530-perl-EncodeNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-426
https://bugzilla.redhat.com/show_bug.cgi?id=1983786perl-Encode: bug in local configuration loading allows arbitrary Perl code execution placed under the current working directory

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 4 лет назад

Encode.pm, as distributed in Perl through 5.34.0, allows local users to gain privileges via a Trojan horse Encode::ConfigLocal library (in the current working directory) that preempts dynamic module loading. Exploitation requires an unusual configuration, and certain 2021 versions of Encode.pm (3.05 through 3.11). This issue occurs because the || operator evaluates @INC in a scalar context, and thus @INC has only an integer value.

CVSS3: 7.8
nvd
больше 4 лет назад

Encode.pm, as distributed in Perl through 5.34.0, allows local users to gain privileges via a Trojan horse Encode::ConfigLocal library (in the current working directory) that preempts dynamic module loading. Exploitation requires an unusual configuration, and certain 2021 versions of Encode.pm (3.05 through 3.11). This issue occurs because the || operator evaluates @INC in a scalar context, and thus @INC has only an integer value.

CVSS3: 7.8
debian
больше 4 лет назад

Encode.pm, as distributed in Perl through 5.34.0, allows local users t ...

CVSS3: 7.8
github
больше 3 лет назад

Encode.pm, as distributed in Perl through 5.34.0, allows local users to gain privileges via a Trojan horse Encode::ConfigLocal library (in the current working directory) that preempts dynamic module loading. Exploitation requires an unusual configuration, and certain 2021 versions of Encode.pm (3.05 through 3.11). This issue occurs because the || operator evaluates @INC in a scalar context, and thus @INC has only an integer value.

CVSS3: 8.8
fstec
больше 4 лет назад

Уязвимость модуля Encode.pm интерпретатора языка программирования Perl, позволяющая нарушителю внедрить произвольный код и повысить свои привилегии

7.8 High

CVSS3