605
VMScore

CVE-2021-36770

Published: 11/08/2021 Updated: 07/11/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Encode.pm, as distributed in Perl up to and including 5.34.0, allows local users to gain privileges via a Trojan horse Encode::ConfigLocal library (in the current working directory) that preempts dynamic module loading. Exploitation requires an unusual configuration, and certain 2021 versions of Encode.pm (3.05 up to and including 3.11). This issue occurs because the || operator evaluates @INC in a scalar context, and thus @INC has only an integer value.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

p5-encode_project p5-encode

fedoraproject fedora 34

fedoraproject fedora 33

Vendor Advisories

A flaw was found in perl-Encode, where the Perl5 Encode module loaded modules within the current directory This flaw allows an attacker with write access to the current directory of a Perl5 process to inject arbitrary Perl code when this module is loaded The highest threat from this vulnerability is to confidentiality, integrity, as well as syste ...
A security issue has been found in Perl Encode::ConfigLocal can be loaded from a path relative to the current directory, because the || operator will evaluate @inc in scalar context, putting an integer as the only value in @inc ...