Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2000-0703

9 documents7 sources
Severity
7.2HIGH
EPSS
0.2%
top 51.97%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedOct 20
Latest updateFeb 7

Description

suidperl (aka sperl) does not properly cleanse the escape sequence "~!" before calling /bin/mail to send an error report, which allows local users to gain privileges by setting the "interactive" environmental variable and calling suidperl with a filename that contains the escape sequence.

CVSS vector

AV:L/AC:L/C:C/I:C/A:CExploitability: 3.9 | Impact: 10.0

Affected Packages1 packages

NVDlarry_wall/perl4 versions+3

Patches

🔴Vulnerability Details

2
GHSA
GHSA-fwmf-9cw3-w3x3: suidperl (aka sperl) does not properly cleanse the escape sequence "~!" before calling /bin/mail to send an error report, which allows local users to2022-04-30
CVEList
CVE-2000-0703: suidperl (aka sperl) does not properly cleanse the escape sequence "~!" before calling /bin/mail to send an error report, which allows local users to2000-10-13

💥Exploits & PoCs

3
Exploit-DB
1C: Arcadia Internet Store 1.0 - Denial of Service2001-06-21
Exploit-DB
SUIDPerl 5.00503 - Mail Shell Escape (1)2000-08-07
Exploit-DB
SUIDPerl 5.00503 - Mail Shell Escape (2)2000-08-07

📋Vendor Advisories

2
Chrome
Stable Channel Update for Desktop: CVE-2023-07022023-02-07
Red Hat
security flaw2000-08-07

💬Community

1
Bugzilla
CVE-2000-0703 security flaw2018-08-16