{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T00:15:03.570","vulnerabilities":[{"cve":{"id":"CVE-2011-10007","sourceIdentifier":"9b29abf9-4ab0-4765-b253-1875cd9b441e","published":"2025-06-05T12:15:22.807","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"File::Find::Rule through 0.34 for Perl is vulnerable to Arbitrary Code Execution when `grep()` encounters a crafted filename.\n\nA file handle is opened with the 2 argument form of `open()` allowing an attacker controlled filename to provide the MODE parameter to `open()`, turning the filename into a command to be executed.\n\nExample:\n\n$ mkdir /tmp/poc; echo > \"/tmp/poc/|id\"\n$ perl -MFile::Find::Rule \\\n    -E 'File::Find::Rule->grep(\"foo\")->in(\"/tmp/poc\")'\nuid=1000(user) gid=1000(user) groups=1000(user),100(users)"},{"lang":"es","value":"File::Find::Rule hasta la versión 0.34 para Perl es vulnerable a la ejecución de código arbitrario cuando `grep()` encuentra un nombre de archivo manipulado. Se abre un controlador de archivo con la forma de dos argumentos `open()`, lo que permite que un atacante controle el nombre de archivo proporcionando el parámetro MODE a `open()`, convirtiendo el nombre de archivo en un comando para su ejecución. Ejemplo: $ mkdir /tmp/poc; echo &gt; \"/tmp/poc/|id\" $ perl -MFile::Find::Rule \\ -E 'File::Find::Rule-&gt;grep(\"foo\")-&gt;in(\"/tmp/poc\")' uid=1000(user) gid=1000(user) groups=1000(user),100(users)"}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"9b29abf9-4ab0-4765-b253-1875cd9b441e","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]}],"references":[{"url":"https://github.com/richardc/perl-file-find-rule/commit/df58128bcee4c1da78c34d7f3fe1357e575ad56f.patch","source":"9b29abf9-4ab0-4765-b253-1875cd9b441e"},{"url":"https://github.com/richardc/perl-file-find-rule/pull/4","source":"9b29abf9-4ab0-4765-b253-1875cd9b441e"},{"url":"https://metacpan.org/release/RCLAMP/File-Find-Rule-0.34/source/lib/File/Find/Rule.pm#L423","source":"9b29abf9-4ab0-4765-b253-1875cd9b441e"},{"url":"https://rt.cpan.org/Public/Bug/Display.html?id=64504","source":"9b29abf9-4ab0-4765-b253-1875cd9b441e"},{"url":"http://www.openwall.com/lists/oss-security/2025/06/05/4","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openwall.com/lists/oss-security/2025/06/06/1","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openwall.com/lists/oss-security/2025/06/06/3","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.debian.org/debian-lts-announce/2025/06/msg00006.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://github.com/richardc/perl-file-find-rule/pull/4","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}]}}]}