CVE-2013-1437
Published: 28 January 2020
Eval injection vulnerability in the Module-Metadata module before 1.000015 for Perl allows remote attackers to execute arbitrary Perl code via the $Version value.
Notes
Author | Note |
---|---|
seth-arnold | "low" priority because the "fix" is to the documentation: the intended behavior is to execute code to determine metadata. |
mdeslaur | marking as ignored. |
Priority
CVSS 3 base score: 9.8
Status
Package | Release | Status |
---|---|---|
libmodule-metadata-perl Launchpad, Ubuntu, Debian |
lucid |
Does not exist
|
precise |
Ignored
|
|
quantal |
Ignored
|
|
raring |
Ignored
(reached end-of-life)
|
|
saucy |
Ignored
|
|
upstream |
Released
(1.000015-1)
|
|
Patches: vendor: http://anonscm.debian.org/gitweb/?p=pkg-perl/packages/libmodule-metadata-perl.git;a=commitdiff;h=4e8e63bb8ddfb0f47835602a793c2fd896feac24;hp=8ba6d45f647a4df5047296f79314641a7b63563a |
||
perl Launchpad, Ubuntu, Debian |
lucid |
Not vulnerable
|
precise |
Not vulnerable
|
|
quantal |
Not vulnerable
|
|
raring |
Ignored
(reached end-of-life)
|
|
saucy |
Not vulnerable
|
|
upstream |
Needs triage
|