Access Restriction Bypass Affecting perl5 package, versions [5.10.0,5.13.11]


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
5.59% (90th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-PERL5-2317610
  • published14 Dec 2021
  • disclosed11 Apr 2011
  • creditUnknown

Introduced: 11 Apr 2011

CVE-2011-1487  (opens in a new tab)
CWE-264  (opens in a new tab)

How to fix?

There is no fixed version for perl5.

Overview

Affected versions of this package are vulnerable to Access Restriction Bypass. The (1) lc, (2) lcfirst, (3) uc, and (4) ucfirst functions in Perl 5.10.x, 5.11.x, and 5.12.x through 5.12.3, and 5.13.x through 5.13.11, do not apply the taint attribute to the return value upon processing tainted input, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.

References

CVSS Base Scores

version 3.1