6.8
CVSSv2

CVE-2013-4407

Published: 23/11/2013 Updated: 12/04/2024
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

HTTP::Body::Multipart in the HTTP-Body module for Perl (1.07 up to and including 1.22, prior to 1.23) uses the part of the uploaded file's name after the first "." character as the suffix of a temporary file, which makes it easier for remote malicious users to conduct attacks by leveraging subsequent behavior that may assume the suffix is well-formed.

Vulnerable Product Search on Vulmon Subscribe to Product

http-body project http-body 1.05

http-body project http-body 1.01

http-body project http-body 0.2

http-body project http-body 0.9

http-body project http-body

http-body project http-body 0.8

http-body project http-body 0.5

http-body project http-body 1.12

http-body project http-body 1.04

http-body project http-body 1.10

http-body project http-body 1.02

http-body project http-body 0.4

http-body project http-body 1.08

http-body project http-body 0.6

http-body project http-body 0.03

http-body project http-body 1.14

http-body project http-body 1.07

http-body project http-body 1.15

http-body project http-body 1.00

http-body project http-body 0.7

http-body project http-body 1.09

http-body project http-body 1.11

http-body project http-body 1.06

http-body project http-body 0.01

http-body project http-body 1.03

http-body project http-body 1.16

Vendor Advisories

Debian Bug report logs - #721634 libhttp-body-perl: CVE-2013-4407: HTTP::Body::Multipart critical security bug Package: libhttp-body-perl; Maintainer for libhttp-body-perl is Debian Perl Group <pkg-perl-maintainers@listsaliothdebianorg>; Source for libhttp-body-perl is src:libhttp-body-perl (PTS, buildd, popcon) Reported ...
Jonathan Dolle reported a design error in HTTP::Body, a Perl module for processing data from HTTP POST requests The HTTP body multipart parser creates temporary files which preserve the suffix of the uploaded file An attacker able to upload files to a service that uses HTTP::Body::Multipart could potentially execute commands on the server if thes ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> HTTP::Body before 123 for Perl is still vulnerable to CVE-2013-4407 <!--X-Subject-Header-End--> <!--X-Head-of-Message--> Fr ...