ID CVE-2006-2856 Type cve Reporter cve@mitre.org Modified 2017-07-20T01:31:00
Description
ActiveState ActivePerl 5.8.8.817 for Windows configures the site/lib directory with "Users" group permissions for changing files, which allows local users to gain privileges by creating a malicious sitecustomize.pl file in that directory. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.
{"id": "CVE-2006-2856", "bulletinFamily": "NVD", "title": "CVE-2006-2856", "description": "ActiveState ActivePerl 5.8.8.817 for Windows configures the site/lib directory with \"Users\" group permissions for changing files, which allows local users to gain privileges by creating a malicious sitecustomize.pl file in that directory. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.", "published": "2006-06-06T20:06:00", "modified": "2017-07-20T01:31:00", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-2856", "reporter": "cve@mitre.org", "references": ["http://secunia.com/advisories/20328", "https://exchange.xforce.ibmcloud.com/vulnerabilities/26915", "http://www.osvdb.org/25974", "http://www.vupen.com/english/advisories/2006/2140", "http://www.securityfocus.com/bid/18269"], "cvelist": ["CVE-2006-2856"], "type": "cve", "lastseen": "2019-05-29T18:08:32", "history": [], "edition": 1, "hashmap": [{"key": "affectedSoftware", "hash": "9dd73479f320be6b0bc5df313cccc290"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cpe", "hash": "c1ab5f2b274ed5413ac06fce8b7505c9"}, {"key": "cpe23", "hash": "ba6e34afbf7a249f34618708c2c8b14d"}, {"key": "cvelist", "hash": "7fc626d9c226615c2f15cbce9620ff67"}, {"key": "cvss", "hash": "6f6410364e4cee78bd47ed1fc3d8dd5b"}, {"key": "cvss2", "hash": "a20e5567f34056412c98626d7c0696f5"}, {"key": "cvss3", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cwe", "hash": "78a7a5cbaf09985c14389298e454e7db"}, {"key": "description", "hash": "4817ab42a6ca80f117f06c6f06343a64"}, {"key": "href", "hash": "57cb15f270764e148f97fe7a42c1c694"}, {"key": "modified", "hash": "772385440fbfe774ea23f6f8ee34966e"}, {"key": "published", "hash": "db2b6b4ec5fd26e7259f7ba6b9e7a440"}, {"key": "references", "hash": "a2779a339344a6de2e72a5d0e3695df5"}, {"key": "reporter", "hash": "444c2b4dda4a55437faa8bef1a141e84"}, {"key": "title", "hash": "880aadcc623df25dcbee68c80ff564e3"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}], "hash": "b02c6fe911833a622f941b77edc2db44c06b374dbd2c1c664ef70054151aa7c3", "viewCount": 0, "enchantments": {"dependencies": {"references": [{"type": "osvdb", "idList": ["OSVDB:25974"]}], "modified": "2019-05-29T18:08:32"}, "score": {"value": 4.7, "vector": "NONE", "modified": "2019-05-29T18:08:32"}, "vulnersScore": 4.7}, "objectVersion": "1.3", "cpe": ["cpe:/a:activestate:activeperl:5.8.8.817"], "affectedSoftware": [{"name": "activestate activeperl", "operator": "eq", "version": "5.8.8.817"}], "cvss2": {"cvssV2": {"accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "severity": "MEDIUM", "userInteractionRequired": false}, "cvss3": {}, "cpe23": ["cpe:2.3:a:activestate:activeperl:5.8.8.817:*:windows:*:*:*:*:*"], "cwe": ["NVD-CWE-Other"]}
{"osvdb": [{"lastseen": "2017-04-28T13:20:22", "bulletinFamily": "software", "description": "## Vulnerability Description\nActiveState ActivePerl contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered when the attacker creates a malicious 'sitecustomize.pl' file in the 'site/lib' directory. This flaw may lead to a loss of integrity.\n## Technical Description\nThis issue can only be exploited on Windows operating systems.\n\nThe issue is caused due to a combination of insecure use of the 'sitecustomize.pl' file and insecure default directory permissions granting Users group to create files in 'site/lib' directory. This issue allows local attackers to execute Perl script code with the privileges of other users executing ActivePerl.\n## Solution Description\nCurrently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workarounds: \n\n1. Create an empty sitecustomize.pl in the 'site/lib' directory.\n2. Always run ActivePerl with the '-f' command line option.\n## Short Description\nActiveState ActivePerl contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered when the attacker creates a malicious 'sitecustomize.pl' file in the 'site/lib' directory. This flaw may lead to a loss of integrity.\n## References:\nVendor URL: http://www.activestate.com/Products/ActivePerl/\n[Secunia Advisory ID:20328](https://secuniaresearch.flexerasoftware.com/advisories/20328/)\nFrSIRT Advisory: ADV-2006-2140\n[CVE-2006-2856](https://vulners.com/cve/CVE-2006-2856)\nBugtraq ID: 18269\n", "modified": "2006-06-05T04:49:13", "published": "2006-06-05T04:49:13", "href": "https://vulners.com/osvdb/OSVDB:25974", "id": "OSVDB:25974", "type": "osvdb", "title": "ActivePerl sitecustomize.pl Local Privilege Escalation", "cvss": {"score": 4.6, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}]}