CVE-2021-36770Uncontrolled Search Path Element in Project P5-encode

Severity
7.8HIGHNVD
EPSS
0.1%
top 70.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 11
Latest updateApr 15

Description

Encode.pm, as distributed in Perl through 5.34.0, allows local users to gain privileges via a Trojan horse Encode::ConfigLocal library (in the current working directory) that preempts dynamic module loading. Exploitation requires an unusual configuration, and certain 2021 versions of Encode.pm (3.05 through 3.11). This issue occurs because the || operator evaluates @INC in a scalar context, and thus @INC has only an integer value.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

NVDp5-encode_project/p5-encode3.053.12
Debianperl/perl< 5.32.1-4+deb11u1+3

Also affects: Fedora 33, 34

Patches

🔴Vulnerability Details

3
GHSA
GHSA-3gfh-9hwx-r3vr: Encode2022-05-24
OSV
CVE-2021-36770: Encode2021-08-11
CVEList
CVE-2021-36770: Encode2021-08-11

📋Vendor Advisories

5
Oracle
Oracle Oracle Enterprise Manager Risk Matrix: Provisioning (Perl) — CVE-2021-367702024-04-15
Oracle
Oracle Oracle Fusion Middleware Risk Matrix: Third Party Patch (Perl) — CVE-2021-367702023-01-15
Red Hat
perl-Encode: bug in local configuration loading allows arbitrary Perl code execution placed under the current working directory2021-08-09
Ubuntu
Perl vulnerability2021-08-09
Debian
CVE-2021-36770: libencode-perl - Encode.pm, as distributed in Perl through 5.34.0, allows local users to gain pri...2021