Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <cdc064f9-a872-42de-8f20-7a3117a99a3c@cpansec.org>
Date: Wed, 13 May 2026 23:26:02 +0100
From: Robert Rothenberg <rrwo@...nsec.org>
To: cve-announce@...urity.metacpan.org, oss-security@...ts.openwall.com
Subject: CVE-2026-8500: Web::Passwd versions through 0.03 for Perl is
 vulnerable to RCE

========================================================================
CVE-2026-8500                                        CPAN Security Group
========================================================================

         CVE ID:  CVE-2026-8500
   Distribution:  Web-Passwd
       Versions:  through 0.03

       MetaCPAN:  https://metacpan.org/dist/Web-Passwd


Web::Passwd versions through 0.03 for Perl is vulnerable to RCE

Description
-----------
Web::Passwd versions through 0.03 for Perl is vulnerable to RCE.

Web::Passwd is a small CGI application for managing htpasswd files
using the htpasswd command.

The user parameter is not validated or escaped, and is used as the last
argument on the command line, allowing for command injection.

Problem types
-------------
- CWE-78 Improper Neutralization of Special Elements used in an OS
   Command

Solutions
---------
This application has not been updated since 2007 and appears to have
been abandoned. Use other solutions.


References
----------
https://metacpan.org/release/EVANK/Web-Passwd-0.03
https://httpd.apache.org/docs/current/programs/htpasswd.html

Timeline
--------
- 2007-02-08: Web::Passwd 0.03 was released



Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.