CVE-2010-2253
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
06/07/2010
Last modified:
11/04/2025
Description
lwp-download in libwww-perl before 5.835 does not reject downloads to filenames that begin with a . (dot) character, which allows remote servers to create or overwrite files via (1) a 3xx redirect to a URL with a crafted filename or (2) a Content-Disposition header that suggests a crafted filename, and possibly execute arbitrary code as a consequence of writing to a dotfile in a home directory.
Impact
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:gisle_aas:libwww-perl:0.01:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gisle_aas:libwww-perl:0.02:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gisle_aas:libwww-perl:0.03:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gisle_aas:libwww-perl:0.04:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gisle_aas:libwww-perl:5.00:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gisle_aas:libwww-perl:5.01:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gisle_aas:libwww-perl:5.02:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gisle_aas:libwww-perl:5.03:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gisle_aas:libwww-perl:5.04:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gisle_aas:libwww-perl:5.05:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gisle_aas:libwww-perl:5.06:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gisle_aas:libwww-perl:5.07:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gisle_aas:libwww-perl:5.08:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gisle_aas:libwww-perl:5.09:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gisle_aas:libwww-perl:5.10:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://cpansearch.perl.org/src/GAAS/libwww-perl-5.836/Changes
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050232.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050245.html
- http://marc.info/?l=oss-security&m=127411372529485&w=2
- http://marc.info/?l=oss-security&m=127611288927500&w=2
- http://www.ocert.org/advisories/ocert-2010-001.html
- http://www.ubuntu.com/usn/USN-981-1
- http://www.vupen.com/english/advisories/2010/2872
- https://bugzilla.redhat.com/show_bug.cgi?id=591580
- https://bugzilla.redhat.com/show_bug.cgi?id=602800
- http://cpansearch.perl.org/src/GAAS/libwww-perl-5.836/Changes
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050232.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050245.html
- http://marc.info/?l=oss-security&m=127411372529485&w=2
- http://marc.info/?l=oss-security&m=127611288927500&w=2
- http://www.ocert.org/advisories/ocert-2010-001.html
- http://www.ubuntu.com/usn/USN-981-1
- http://www.vupen.com/english/advisories/2010/2872
- https://bugzilla.redhat.com/show_bug.cgi?id=591580
- https://bugzilla.redhat.com/show_bug.cgi?id=602800



