7.5
CVSSv2

CVE-2012-6329

Published: 04/01/2013 Updated: 08/12/2016
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 760
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The _compile function in Maketext.pm in the Locale::Maketext implementation in Perl prior to 5.17.7 does not properly handle backslashes and fully qualified method names during compilation of bracket notation, which allows context-dependent malicious users to execute arbitrary commands via crafted input to an application that accepts translation strings from users, as demonstrated by the TWiki application prior to 5.1.3, and the Foswiki application 1.0.x up to and including 1.0.10 and 1.1.x up to and including 1.1.6.

Vulnerable Product Search on Vulmon Subscribe to Product

perl perl 5.16.0

perl perl 5.14.3

perl perl 5.14.0

perl perl 5.13.2

perl perl 5.10.0

perl perl 5.12.0

perl perl 5.11.4

perl perl 5.11.2

perl perl 5.11.3

perl perl 5.12.3

perl perl

perl perl 5.16.1

perl perl 5.14.1

perl perl 5.13.0

perl perl 5.13.3

perl perl 5.11.0

perl perl 5.10

perl perl 5.12.1

perl perl 5.12.2

perl perl 5.10.1

perl perl 5.13.5

perl perl 5.13.4

perl perl 5.11.5

perl perl 5.13.8

perl perl 5.13.9

perl perl 5.13.10

perl perl 5.14.2

perl perl 5.13.7

perl perl 5.13.6

perl perl 5.13.1

perl perl 5.11.1

perl perl 5.13.11

Vendor Advisories

Synopsis Moderate: perl security update Type/Severity Security Advisory: Moderate Topic Updated perl packages that fix multiple security issues now availablefor Red Hat Enterprise Linux 5 and 6The Red Hat Security Response Team has rated this update as havingmoderate security impact Common Vulnerability S ...
Perl could be made to run programs if it processed a specially crafted Locale::Maketext templates ...
A heap overflow flaw was found in Perl If a Perl application allowed user input to control the count argument of the string repeat operator, an attacker could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application (CVE-2012-5195) A denial of service flaw was found in the way ...

Exploits

## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # web site for more information on licensing and terms of use # metasploitcom/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit ...
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # web site for more information on licensing and terms of use # metasploitcom/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit ...
TWiki versions 4x and 510 through 512 suffers from a remote command execution vulnerability due to an underlying security issue in the Locale::Maketext CPAN module ...
This Metasploit module exploits a vulnerability in the MAKETEXT Twiki variable By using a specially crafted MAKETEXT, a malicious user can execute shell commands since user input is passed to the Perl "eval" command without first being sanitized The problem is caused by an underlying security issue in the CPAN:Locale::Maketext module This works ...