CVE-2008-7319

The Net::Ping::External extension through 0.15 for Perl does not properly sanitize arguments (e.g., invalid hostnames) containing shell metacharacters before use of backticks in External.pm, allowing for shell command injection and arbitrary command execution if untrusted input is used.
References
Link Resource
http://matthias.sdfeu.org/devel/net-ping-external-cmd-injection.patch Issue Tracking Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2017/11/07/4 Issue Tracking Mailing List Patch Third Party Advisory
https://bugs.debian.org/881097 Issue Tracking Patch Third Party Advisory
https://rt.cpan.org/Public/Bug/Display.html?id=33230 Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:net-ping-external_project:net-ping-external:*:*:*:*:*:perl:*:*

History

No history.

Information

Published : 2017-11-07 21:29

Updated : 2023-12-10 12:15


NVD link : CVE-2008-7319

Mitre link : CVE-2008-7319

CVE.ORG link : CVE-2008-7319


JSON object : View

Products Affected

net-ping-external_project

  • net-ping-external
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')