ActivePerl sitecustomize.pl Local Privilege Escalation
2006-06-05T04:49:13
ID OSVDB:25974 Type osvdb Reporter Kreej() Modified 2006-06-05T04:49:13
Description
Vulnerability Description
ActiveState ActivePerl contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered when the attacker creates a malicious 'sitecustomize.pl' file in the 'site/lib' directory. This flaw may lead to a loss of integrity.
Technical Description
This issue can only be exploited on Windows operating systems.
The issue is caused due to a combination of insecure use of the 'sitecustomize.pl' file and insecure default directory permissions granting Users group to create files in 'site/lib' directory. This issue allows local attackers to execute Perl script code with the privileges of other users executing ActivePerl.
Solution Description
Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workarounds:
Create an empty sitecustomize.pl in the 'site/lib' directory.
Always run ActivePerl with the '-f' command line option.
Short Description
ActiveState ActivePerl contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered when the attacker creates a malicious 'sitecustomize.pl' file in the 'site/lib' directory. This flaw may lead to a loss of integrity.
{"type": "osvdb", "published": "2006-06-05T04:49:13", "href": "https://vulners.com/osvdb/OSVDB:25974", "hashmap": [{"key": "affectedSoftware", "hash": "61b384ec5085767bff43ba5c99cdd35e"}, {"key": "bulletinFamily", "hash": "f9fa10ba956cacf91d7878861139efb9"}, {"key": "cvelist", "hash": "7fc626d9c226615c2f15cbce9620ff67"}, {"key": "cvss", "hash": "292f2e293571b0e70e3182b615982dad"}, {"key": "description", "hash": "bebfb8583bea817566629852c411a48a"}, {"key": "href", "hash": "44ae91c58d305b4f278b2240135abcf6"}, {"key": "modified", "hash": "13b3b6fa4da814a13b53411bfa80fd34"}, {"key": "objectVersion", "hash": "56765472680401499c79732468ba4340"}, {"key": "published", "hash": "13b3b6fa4da814a13b53411bfa80fd34"}, {"key": "references", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "reporter", "hash": "fd1064ae076d273003f19fb21a409a60"}, {"key": "title", "hash": "3356c244515e2701666c43ef1e92a937"}, {"key": "type", "hash": "1327ac71f7914948578f08c54f772b10"}], "bulletinFamily": "software", "cvss": {"vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/", "score": 4.6}, "viewCount": 6, "history": [], "edition": 1, "objectVersion": "1.2", "reporter": "Kreej()", "title": "ActivePerl sitecustomize.pl Local Privilege Escalation", "affectedSoftware": [{"operator": "eq", "version": "5.8.8.817", "name": "ActivePerl"}], "enchantments": {"score": {"value": 5.8, "vector": "NONE", "modified": "2017-04-28T13:20:22"}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2006-2856"]}], "modified": "2017-04-28T13:20:22"}, "vulnersScore": 5.8}, "references": [], "id": "OSVDB:25974", "hash": "05e0e27b8724288589af33215c0fe1f036a30d8db648545976aeabd2d4cd96a7", "lastseen": "2017-04-28T13:20:22", "cvelist": ["CVE-2006-2856"], "modified": "2006-06-05T04:49:13", "description": "## Vulnerability Description\nActiveState ActivePerl contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered when the attacker creates a malicious 'sitecustomize.pl' file in the 'site/lib' directory. This flaw may lead to a loss of integrity.\n## Technical Description\nThis issue can only be exploited on Windows operating systems.\n\nThe issue is caused due to a combination of insecure use of the 'sitecustomize.pl' file and insecure default directory permissions granting Users group to create files in 'site/lib' directory. This issue allows local attackers to execute Perl script code with the privileges of other users executing ActivePerl.\n## Solution Description\nCurrently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workarounds: \n\n1. Create an empty sitecustomize.pl in the 'site/lib' directory.\n2. Always run ActivePerl with the '-f' command line option.\n## Short Description\nActiveState ActivePerl contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered when the attacker creates a malicious 'sitecustomize.pl' file in the 'site/lib' directory. This flaw may lead to a loss of integrity.\n## References:\nVendor URL: http://www.activestate.com/Products/ActivePerl/\n[Secunia Advisory ID:20328](https://secuniaresearch.flexerasoftware.com/advisories/20328/)\nFrSIRT Advisory: ADV-2006-2140\n[CVE-2006-2856](https://vulners.com/cve/CVE-2006-2856)\nBugtraq ID: 18269\n"}
{"cve": [{"lastseen": "2019-05-29T18:08:32", "bulletinFamily": "NVD", "description": "ActiveState ActivePerl 5.8.8.817 for Windows configures the site/lib directory with \"Users\" group permissions for changing files, which allows local users to gain privileges by creating a malicious sitecustomize.pl file in that directory. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.", "modified": "2017-07-20T01:31:00", "id": "CVE-2006-2856", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-2856", "published": "2006-06-06T20:06:00", "title": "CVE-2006-2856", "type": "cve", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}]}