Vulnerability Details : CVE-2012-6329
Public exploit exists!
The _compile function in Maketext.pm in the Locale::Maketext implementation in Perl before 5.17.7 does not properly handle backslashes and fully qualified method names during compilation of bracket notation, which allows context-dependent attackers to execute arbitrary commands via crafted input to an application that accepts translation strings from users, as demonstrated by the TWiki application before 5.1.3, and the Foswiki application 1.0.x through 1.0.10 and 1.1.x through 1.1.6.
Exploit prediction scoring system (EPSS) score for CVE-2012-6329
Probability of exploitation activity in the next 30 days: 58.97%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 98 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2012-6329
-
TWiki MAKETEXT Remote Command Execution
Disclosure Date: 2012-12-15First seen: 2020-04-26exploit/unix/webapp/twiki_maketextThis module exploits a vulnerability in the MAKETEXT Twiki variable. By using a specially crafted MAKETEXT, a malicious user can execute shell commands since user input is passed to the Perl "eval" command without first being sanitized. The problem is caused by an -
Foswiki MAKETEXT Remote Command Execution
Disclosure Date: 2012-12-03First seen: 2020-04-26exploit/unix/webapp/foswiki_maketextThis module exploits a vulnerability in the MAKETEXT Foswiki variable. By using a specially crafted MAKETEXT, a malicious user can execute shell commands since the input is passed to the Perl "eval" command without first being sanitized. The problem is caused by an
CVSS scores for CVE-2012-6329
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2012-6329
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-6329
-
http://rhn.redhat.com/errata/RHSA-2013-0685.html
RHSA-2013:0685 - Security Advisory - Red Hat Customer Portal
-
http://openwall.com/lists/oss-security/2012/12/11/4
oss-security - Re: CVE request: perl-modules
-
http://perl5.git.perl.org/perl.git/commit/1735f6f53ca19f99c6e9e39496c486af323ba6a8
Perl 5 - perl.git/commitPatch
-
http://code.activestate.com/lists/perl5-porters/187763/
404 Not Found
-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695224
#695224 - perl-modules: Locale::Maketext code injection - Debian Bug report logs
-
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
Juniper Networks - 2015-10 Security Bulletin: CTPView: Multiple Vulnerabilities in CTPView
-
https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0032
Support/Advisories/MGASA-2013-0032 - Mageia wiki
-
http://perl5.git.perl.org/perl.git/blob/HEAD:/pod/perl5177delta.pod
Perl 5 - perl.git/blob - pod/perl5177delta.pod
-
http://www.securityfocus.com/bid/56950
TWiki and Foswiki 'MAKETEXT' Variable Multiple Security Vulnerabilities
-
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735
Juniper Networks - 2016-04 Security Bulletin: CTP Series: Multiple vulnerabilities in CTP Series
-
https://bugzilla.redhat.com/show_bug.cgi?id=884354
884354 – (CVE-2012-6329) CVE-2012-6329 perl: possible arbitrary code execution via Locale::Maketext
-
http://www.ubuntu.com/usn/USN-2099-1
USN-2099-1: Perl vulnerability | Ubuntu security notices
-
http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2012-6329
SecurityAlert-CVE-2012-6329 < Codev < TWiki
-
http://code.activestate.com/lists/perl5-porters/187746/
404 Not Found
-
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
Oracle VM Server for x86 Bulletin - July 2016
-
http://sourceforge.net/mailarchive/message.php?msg_id=30219695
Foswiki / [Foswiki-announce] Security Alert CVE-2012-6329: Foswiki MAKETEXT Variable Allows Arbitrary Shell Command Execution
-
http://www.mandriva.com/security/advisories?name=MDVSA-2013:113
mandriva.com
Products affected by CVE-2012-6329
- cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.10:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.10.0:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.14.0:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.0:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.10.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.10.1:rc2:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.10.1:rc1:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.10.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.13.4:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.13.5:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.13.6:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.13.2:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.13.3:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.13.11:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.13.0:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.13.1:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.13.9:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.13.10:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.13.7:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.13.8:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.11.1:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.11.0:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.11.4:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.11.5:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.11.2:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.11.3:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.0:rc0:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.3:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.3:rc1:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.3:rc2:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.0:rc4:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.1:rc1:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.0:rc5:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.1:rc2:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.2:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.3:rc3:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.2:rc1:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.14.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.14.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.14.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.14.1:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.14.2:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.16.0:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.14.3:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.16.1:*:*:*:*:*:*:*