{ "document": { "aggregate_severity": { "text": "critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "description", "text": "The Net::Ping::External extension through 0.15 for Perl does not properly sanitize arguments (e.g., invalid hostnames) containing shell metacharacters before use of backticks in External.pm, allowing for shell command injection and arbitrary command execution if untrusted input is used.", "title": "Vulnerability Description" } ], "publisher": { "category": "other", "contact_details": "gdt@cpan.org", "name": "giterlizzi", "namespace": "https://github.com/giterlizzi/" }, "references": [ { "category": "self", "summary": "CPANSA-Net-Ping-External-2008-7319 JSON", "url": "https://raw.githubusercontent.com/giterlizzi/perl-CPANSA-CSAF/develop/csaf/white/2017/cpansa-net-ping-external-2008-7319.json" }, { "category": "external", "summary": "https://rt.cpan.org/Public/Bug/Display.html?id=33230", "url": "https://rt.cpan.org/Public/Bug/Display.html?id=33230" }, { "category": "external", "summary": "https://bugs.debian.org/881097", "url": "https://bugs.debian.org/881097" }, { "category": "external", "summary": "http://www.openwall.com/lists/oss-security/2017/11/07/4", "url": "http://www.openwall.com/lists/oss-security/2017/11/07/4" }, { "category": "external", "summary": "http://matthias.sdfeu.org/devel/net-ping-external-cmd-injection.patch", "url": "http://matthias.sdfeu.org/devel/net-ping-external-cmd-injection.patch" }, { "category": "external", "summary": "CVE-2008-7319 (NVD)", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-7319" } ], "title": "Net-Ping-External vulnerability", "tracking": { "current_release_date": "2017-11-07T00:00:00", "generator": { "engine": { "name": "CSAF Perl Toolkit", "version": "0.26" } }, "id": "CPANSA-Net-Ping-External-2008-7319", "initial_release_date": "2017-11-07T00:00:00", "revision_history": [ { "date": "2017-11-07T00:00:00", "number": "1", "summary": "First release" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:cpan/<=0.15", "product": { "name": "Net-Ping-External less than or equal 0.15", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "Net-Ping-External" } ] }, "vulnerabilities": [ { "cve": "CVE-2008-7319", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command ('Command Injection')" }, "notes": [ { "category": "description", "text": "The Net::Ping::External extension through 0.15 for Perl does not properly sanitize arguments (e.g., invalid hostnames) containing shell metacharacters before use of backticks in External.pm, allowing for shell command injection and arbitrary command execution if untrusted input is used.", "title": "Vulnerability Description" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "scores": [ { "cvss_v2": { "baseScore": 10, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] } ] }