|
|
Message-ID: <cdc064f9-a872-42de-8f20-7a3117a99a3c@cpansec.org> Date: Wed, 13 May 2026 23:26:02 +0100 From: Robert Rothenberg <rrwo@...nsec.org> To: cve-announce@...urity.metacpan.org, oss-security@...ts.openwall.com Subject: CVE-2026-8500: Web::Passwd versions through 0.03 for Perl is vulnerable to RCE ======================================================================== CVE-2026-8500 CPAN Security Group ======================================================================== CVE ID: CVE-2026-8500 Distribution: Web-Passwd Versions: through 0.03 MetaCPAN: https://metacpan.org/dist/Web-Passwd Web::Passwd versions through 0.03 for Perl is vulnerable to RCE Description ----------- Web::Passwd versions through 0.03 for Perl is vulnerable to RCE. Web::Passwd is a small CGI application for managing htpasswd files using the htpasswd command. The user parameter is not validated or escaped, and is used as the last argument on the command line, allowing for command injection. Problem types ------------- - CWE-78 Improper Neutralization of Special Elements used in an OS Command Solutions --------- This application has not been updated since 2007 and appears to have been abandoned. Use other solutions. References ---------- https://metacpan.org/release/EVANK/Web-Passwd-0.03 https://httpd.apache.org/docs/current/programs/htpasswd.html Timeline -------- - 2007-02-08: Web::Passwd 0.03 was released
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.