Bug 2308078 (CVE-2024-45321) - CVE-2024-45321 perl-App-cpanminus: Insecure HTTP in App::cpanminus Allows Code Execution Vulnerability
Summary: CVE-2024-45321 perl-App-cpanminus: Insecure HTTP in App::cpanminus Allows Cod...
Keywords:
Status: NEW
Alias: CVE-2024-45321
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2308438 2308439
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-08-27 04:20 UTC by OSIDB Bzimport
Modified: 2024-08-29 16:20 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in App::cpanminus (cpanm) through version 1.7047. The default configuration downloads Perl modules from CPAN using HTTP, which could allow an attacker to view or modify the content without the knowledge of the user. This issue could allow an attacker to execute malicious code if they have the ability to intercept and modify the content before it reaches to user.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2024-08-27 04:20:30 UTC
The App::cpanminus package through 1.7047 for Perl downloads code via insecure HTTP, enabling code execution for network attackers.

Comment 1 Petr Pisar 2024-08-29 12:28:50 UTC
Indeed App-cpanminus-1.7047 uses HTTP. Relevant upstream bug reports:

https://github.com/miyagawa/cpanminus/issues/603
https://github.com/miyagawa/cpanminus/issues/611

Relevant upstream pull requests:

https://github.com/miyagawa/cpanminus/pull/674
https://github.com/miyagawa/cpanminus/pull/678


Note You need to log in before you can comment on or make changes to this bug.