File::Find::Rule through 0.34 for Perl is vulnerable to Arbitrary Code Execution when `grep()` encounters a crafted filename. A file handle is opened with the 2 argument form of `open()` allowing an attacker controlled filename to provide the MODE parameter to `open()`, turning the filename into a command to be executed. Example: $ mkdir /tmp/poc; echo > "/tmp/poc/|id" $ perl -MFile::Find::Rule \     -E 'File::Find::Rule->grep("foo")->in("/tmp/poc")' uid=1000(user) gid=1000(user) groups=1000(user),100(users)
History

Fri, 06 Jun 2025 19:00:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Fri, 06 Jun 2025 04:45:00 +0000


Thu, 05 Jun 2025 21:45:00 +0000

Type Values Removed Values Added
References

Thu, 05 Jun 2025 17:45:00 +0000

Type Values Removed Values Added
References

Thu, 05 Jun 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 05 Jun 2025 12:15:00 +0000

Type Values Removed Values Added
Description File::Find::Rule through 0.34 for Perl is vulnerable to Arbitrary Code Execution when `grep()` encounters a crafted filename. A file handle is opened with the 2 argument form of `open()` allowing an attacker controlled filename to provide the MODE parameter to `open()`, turning the filename into a command to be executed. Example: $ mkdir /tmp/poc; echo > "/tmp/poc/|id" $ perl -MFile::Find::Rule \     -E 'File::Find::Rule->grep("foo")->in("/tmp/poc")' uid=1000(user) gid=1000(user) groups=1000(user),100(users)
Title File::Find::Rule through 0.34 for Perl is vulnerable to Arbitrary Code Execution when `grep()` encounters a crafted file name
Weaknesses CWE-78
References

cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published: 2025-06-05T11:57:58.654Z

Updated: 2025-06-11T12:27:11.870Z

Reserved: 2025-06-05T01:05:46.861Z

Link: CVE-2011-10007

cve-icon Vulnrichment

Updated: 2025-06-06T03:23:36.825Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-06-05T12:15:22.807

Modified: 2025-06-06T04:15:41.237

Link: CVE-2011-10007

cve-icon Redhat

Severity : Important

Publid Date: 2025-06-05T11:57:58Z

Links: CVE-2011-10007 - Bugzilla