Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <a2f4aa2ef5d6d819b65dcd74cd7a8071@cpansec.org>
Date: Thu, 05 Jun 2025 22:24:04 -0300
From: Timothy Legge <timlegge@...nsec.org>
To: Sam James <sam@...too.org>
Cc: oss-security@...ts.openwall.com
Subject: Re: CVE-2011-10007: File::Find::Rule through 0.34 for
 Perl is vulnerable to Arbitrary Code Execution when `grep()` encounters a
 crafted file name

On 2025-06-05 21:59, Sam James wrote:

>> A file handle is opened with the 2 argument form of `open()` allowing
>> an attacker controlled filename to provide the MODE parameter to
>> `open()`, turning the filename into a command to be executed.
>> 
> 
> FWIW, I've started a broader discussion on the future of 2-arg open on
> p5p at 
> https://www.nntp.perl.org/group/perl.perl5.porters/2025/06/msg269996.html.

Thanks, I just say that.  I was thinking it would be nice to have a way 
to disable it.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.