Vigil@nce - Perl: code execution via Opportunistic Loading
September 2016 by Vigil@nce
This bulletin was written by Vigil@nce : https://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can store a malicious module in the current directory
of Perl programs loading optional uninstalled programs, in order
to run code with privileged of the program.
Impacted products: Debian, Fedora, OpenBSD, openSUSE Leap.
Severity: 2/4.
Creation date: 25/07/2016.
DESCRIPTION OF THE VULNERABILITY
The Perl interpreter can load modules from directories indicated
in the @INC variable.
However, as @INC contains the current directory ("."), an attacker
can force the loading of a malicious optional module, which is not
installed on the system.
An attacker can therefore store a malicious module in the current
directory of Perl programs loading optional uninstalled programs,
in order to run code with privileged of the program.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
https://vigilance.fr/vulnerability/Perl-code-execution-via-Opportunistic-Loading-20210