Lucene search

K
cvelistMitreCVELIST:CVE-2016-10374
HistoryOct 03, 2022 - 4:16 p.m.

CVE-2016-10374

2022-10-0316:16:39
mitre
www.cve.org
perltidy
vulnerability
local users
overwrite
arbitrary files
symlink
symlink attack

5.3 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

perltidy through 20160302, as used by perlcritic, check-all-the-things, and other software, relies on the current working directory for certain output files and does not have a symlink-attack protection mechanism, which allows local users to overwrite arbitrary files by creating a symlink, as demonstrated by creating a perltidy.ERR symlink that the victim cannot delete.

5.3 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%