Vulnerability CVE-2012-6329


Published: 2013-01-04   Modified: 2013-01-05

Description:
The _compile function in Maketext.pm in the Locale::Maketext implementation in Perl before 5.17.7 does not properly handle backslashes and fully qualified method names during compilation of bracket notation, which allows context-dependent attackers to execute arbitrary commands via crafted input to an application that accepts translation strings from users, as demonstrated by the TWiki application before 5.1.3, and the Foswiki application 1.0.x through 1.0.10 and 1.1.x through 1.1.6.

See advisories in our WLB2 database:
Topic
Author
Date
High
TWiki MAKETEXT Variable Allows Arbitrary Shell Command Execution
Peter Thoeny
14.12.2012
High
Foswiki Remote code execution and other vulnerabilities in MAKETEXT
George Clark
17.12.2012
High
Foswiki MAKETEXT Remote Command Execution Exploit
Juan vazquez
24.12.2012
High
TWiki MAKETEXT Remote Command Execution Exploit
Juan vazquez
24.12.2012

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
PERL -> PERL 

 References:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695224
http://code.activestate.com/lists/perl5-porters/187746/
http://code.activestate.com/lists/perl5-porters/187763/
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735
http://openwall.com/lists/oss-security/2012/12/11/4
http://perl5.git.perl.org/perl.git/blob/HEAD:/pod/perl5177delta.pod
http://perl5.git.perl.org/perl.git/commit/1735f6f53ca19f99c6e9e39496c486af323ba6a8
http://rhn.redhat.com/errata/RHSA-2013-0685.html
http://sourceforge.net/mailarchive/message.php?msg_id=30219695
http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2012-6329
http://www.mandriva.com/security/advisories?name=MDVSA-2013:113
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/56950
http://www.ubuntu.com/usn/USN-2099-1
https://bugzilla.redhat.com/show_bug.cgi?id=884354
https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0032

Copyright 2024, cxsecurity.com

 

Back to Top