Bug#1107311: libfile-find-rule-perl: CVE-2011-10007

Salvatore Bonaccorso carnil at debian.org
Thu Jun 5 13:11:37 BST 2025


Source: libfile-find-rule-perl
Version: 0.34-1
Severity: grave
Tags: security upstream
Justification: user security hole
Forwarded: https://github.com/richardc/perl-file-find-rule/pull/4
X-Debbugs-Cc: carnil at debian.org, Debian Security Team <team at security.debian.org>

Hi,

The following vulnerability was published for libfile-find-rule-perl.

CVE-2011-10007[0]:
| File::Find::Rule through 0.34 for Perl is vulnerable to Arbitrary
| Code Execution when `grep()` encounters a crafted filename.  A file
| handle is opened with the 2 argument form of `open()` allowing an
| attacker controlled filename to provide the MODE parameter to
| `open()`, turning the filename into a command to be executed.
| Example:  $ mkdir /tmp/poc; echo > "/tmp/poc/|id" $ perl
| -MFile::Find::Rule \     -E
| 'File::Find::Rule->grep("foo")->in("/tmp/poc")' uid=1000(user)
| gid=1000(user) groups=1000(user),100(users)


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2011-10007
    https://www.cve.org/CVERecord?id=CVE-2011-10007
[1] https://github.com/richardc/perl-file-find-rule/pull/4

Regards,
Salvatore


More information about the pkg-perl-maintainers mailing list