7.5
CVSSv2

CVE-2015-8607

Published: 13/01/2016 Updated: 15/07/2020
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 7.3 | Impact Score: 3.4 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The canonpath function in the File::Spec module in PathTools prior to 3.62, as used in Perl, does not properly preserve the taint attribute of data, which might allow context-dependent malicious users to bypass the taint protection mechanism via a crafted string.

Vulnerable Product Search on Vulmon Subscribe to Product

canonical ubuntu linux 15.04

canonical ubuntu linux 15.10

perl pathtools

debian debian linux 8.0

Vendor Advisories

Debian Bug report logs - #810719 perl: CVE-2015-8607: XS File::Spec::canonpath loses taint Package: perl-base; Maintainer for perl-base is Niko Tyni <ntyni@debianorg>; Source for perl-base is src:perl (PTS, buildd, popcon) Reported by: Dominic Hargreaves <dom@earthli> Date: Mon, 11 Jan 2016 14:42:06 UTC Severity: ...
Perl incorrectly handled the taint attribute ...
The canonpath function in the File::Spec module in PathTools before 362, as used in Perl, does not properly preserve the taint attribute of data, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string ...