Bugzilla – Bug 844951
VUL-0: CVE-2013-4407: perl-HTTP-Body: code execution via command injection
Last modified: 2015-02-19 01:33:31 UTC
via oss-security list CVE-2013-4407 A remote command-injection flaw was reported in HTTP::Body::Multipart versions 1.08 and later[1]. An attacker able to upload files to a service that uses HTTP::Body::Multipart could execute commands on the server. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4407 https://bugzilla.redhat.com/show_bug.cgi?id=1005669 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=721634 http://comments.gmane.org/gmane.comp.security.oss.general/11229
bugbot adjusting priority
There is already a fix: http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=18;filename=CVE-2013-4407.patch;att=1;bug=721634 However the issue is not so severe, as it only *potentially* allows further exploitation if the resulting filenames are passed to system() etc.
ongoing work for fixing pkg
Maintenance Request created: https://build.opensuse.org/request/show/226018
This is an autogenerated message for OBS integration: This bug (844951) was mentioned in https://build.opensuse.org/request/show/226019 13.1+12.3 / perl-HTTP-Body
re;leased
openSUSE-SU-2014:0433-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 844951 CVE References: CVE-2013-4407 Sources used: openSUSE 13.1 (src): perl-HTTP-Body-1.19-2.4.1 openSUSE 12.3 (src): perl-HTTP-Body-1.19-4.4.1