5
CVSSv2

CVE-2011-1487

Published: 11/04/2011 Updated: 17/08/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

The (1) lc, (2) lcfirst, (3) uc, and (4) ucfirst functions in Perl 5.10.x, 5.11.x, and 5.12.x up to and including 5.12.3, and 5.13.x up to and including 5.13.11, do not apply the taint attribute to the return value upon processing tainted input, which might allow context-dependent malicious users to bypass the taint protection mechanism via a crafted string.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

perl perl 5.10.1

perl perl 5.10.0

perl perl 5.13.4

perl perl 5.13.5

perl perl 5.13.6

perl perl 5.13.2

perl perl 5.13.3

perl perl 5.13.11

perl perl 5.13.0

perl perl 5.13.1

perl perl 5.13.9

perl perl 5.13.10

perl perl 5.13.7

perl perl 5.13.8

perl perl 5.11.1

perl perl 5.11.0

perl perl 5.11.4

perl perl 5.11.5

perl perl 5.11.2

perl perl 5.11.3

perl perl 5.12.0

perl perl 5.12.3

perl perl 5.12.1

perl perl 5.12.2

Vendor Advisories

An attacker could send crafted input to Perl and bypass intended restrictions ...
Debian Bug report logs - #622817 perl: CVE-2011-1487: taint laundering in lc, uc Package: perl; Maintainer for perl is Niko Tyni <ntyni@debianorg>; Source for perl is src:perl (PTS, buildd, popcon) Reported by: Dominic Hargreaves <dom@earthli> Date: Thu, 14 Apr 2011 21:12:02 UTC Severity: important Tags: fixed-ups ...

Exploits

source: wwwsecurityfocuscom/bid/47124/info Perl is prone to a security-bypass weakness that occurs when laundering tainted input Attackers can leverage this issue to bypass security checks in perl applications that rely on TAINT mode protection functionality This opens such applications up to potential attacks that take advantage of th ...