Description
Eval injection vulnerability in the Module-Metadata module before 1.000015 for Perl allows remote attackers to execute arbitrary Perl code via the $Version value.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9Attack Vector: Network
Complexity: Low
Privileges: None
User Interaction: None
Scope: Unchanged
Confidentiality: High
Integrity: High
Availability: High
Affected Packages5 packages
▶debiandebian/perl< libmodule-metadata-perl 1.000015-1 (bookworm) Also affects: Fedora 18, 19
🔴Vulnerability Details
2GHSAGHSA-86v9-w7h5-78qj: Eval injection vulnerability in the Module-Metadata module before 1↗2022-05-05 ▶ OSVCVE-2013-1437: Eval injection vulnerability in the Module-Metadata module before 1↗2020-01-28 ▶ 📋Vendor Advisories
2Red Hatperl-Module-Metadata: incorrectly documents that it does not execute unsafe code↗2013-08-21 ▶ DebianCVE-2013-1437: libmodule-metadata-perl - Eval injection vulnerability in the Module-Metadata module before 1.000015 for P...↗2013 ▶ 💬Community
3BugzillaCVE-2013-1437 perl-Module-Metadata: incorrectly documents that it does not execute unsafe code [fedora-all]↗2013-08-21 ▶ BugzillaCVE-2013-1437 perl-Module-Metadata: incorrectly documents that it does not execute unsafe code↗2013-08-12 ▶ BugzillaCVE-2013-2102 Gatein: JGroups configurations enable diagnostics without authentication↗2013-05-16 ▶