Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2013-1437

Published: 28 January 2020

Eval injection vulnerability in the Module-Metadata module before 1.000015 for Perl allows remote attackers to execute arbitrary Perl code via the $Version value.

Notes

AuthorNote
seth-arnold
"low" priority because the "fix" is to the documentation:
the intended behavior is to execute code to determine metadata.
mdeslaur
marking as ignored.

Priority

Low

CVSS 3 base score: 9.8

Status

Package Release Status
libmodule-metadata-perl
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Ignored

quantal Ignored

raring Ignored
(reached end-of-life)
saucy Ignored

upstream
Released (1.000015-1)
Patches:
vendor: http://anonscm.debian.org/gitweb/?p=pkg-perl/packages/libmodule-metadata-perl.git;a=commitdiff;h=4e8e63bb8ddfb0f47835602a793c2fd896feac24;hp=8ba6d45f647a4df5047296f79314641a7b63563a
perl
Launchpad, Ubuntu, Debian
lucid Not vulnerable

precise Not vulnerable

quantal Not vulnerable

raring Ignored
(reached end-of-life)
saucy Not vulnerable

upstream Needs triage