Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <87frgdfzxc.fsf@gentoo.org>
Date: Fri, 06 Jun 2025 01:59:11 +0100
From: Sam James <sam@...too.org>
To: Timothy Legge <timlegge@...nsec.org>
Cc: oss-security@...ts.openwall.com
Subject: Re: CVE-2011-10007: File::Find::Rule through 0.34
 for Perl is vulnerable to Arbitrary Code Execution when `grep()`
 encounters a crafted file name

Timothy Legge <timlegge@...nsec.org> writes:

> [...]
> File::Find::Rule through 0.34 for Perl is vulnerable to Arbitrary Code
> Execution when `grep()` encounters a crafted filename.
>
> A file handle is opened with the 2 argument form of `open()` allowing
> an attacker controlled filename to provide the MODE parameter to
> `open()`, turning the filename into a command to be executed.
>

FWIW, I've started a broader discussion on the future of 2-arg open on
p5p at https://www.nntp.perl.org/group/perl.perl5.porters/2025/06/msg269996.html.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.