![]() |
|
Message-ID: <a2f4aa2ef5d6d819b65dcd74cd7a8071@cpansec.org> Date: Thu, 05 Jun 2025 22:24:04 -0300 From: Timothy Legge <timlegge@...nsec.org> To: Sam James <sam@...too.org> Cc: oss-security@...ts.openwall.com Subject: Re: CVE-2011-10007: File::Find::Rule through 0.34 for Perl is vulnerable to Arbitrary Code Execution when `grep()` encounters a crafted file name On 2025-06-05 21:59, Sam James wrote: >> A file handle is opened with the 2 argument form of `open()` allowing >> an attacker controlled filename to provide the MODE parameter to >> `open()`, turning the filename into a command to be executed. >> > > FWIW, I've started a broader discussion on the future of 2-arg open on > p5p at > https://www.nntp.perl.org/group/perl.perl5.porters/2025/06/msg269996.html. Thanks, I just say that. I was thinking it would be nice to have a way to disable it.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.