CVE-2026-8612
Gravedad CVSS v3.1:
MEDIA
Tipo:
CWE-502
Deserialización de datos no confiables
Fecha de publicación:
15/05/2026
Última modificación:
15/05/2026
Descripción
*** Pendiente de traducción *** WWW::Mechanize::Cached versions before 2.00 for Perl deserialize cached HTTP responses from a world-writable on-disk cache, enabling local response forgery and code execution.<br />
<br />
With no explicit cache backend, WWW::Mechanize::Cached constructs a default Cache::FileCache under /tmp/FileCache without overriding the backend&#39;s documented directory_umask of 000, so the cache root and its subdirectories are created mode 0777 with no sticky bit. Cache entries are named by sha1_hex of the request and read back through Storable::thaw on the next cache hit.<br />
<br />
A local attacker with write access to the cache tree can replace a victim&#39;s cache entry for a known URL with an arbitrary frozen HTTP::Response blob, causing the victim&#39;s next get() of that URL to return attacker controlled response bytes. Because the bytes are passed to Storable::thaw, a victim process that has loaded any class with a side-effectful STORABLE_thaw, DESTROY, or overload hook can be escalated to arbitrary code execution.
Impacto
Puntuación base 3.x
5.30
Gravedad 3.x
MEDIA



