Click the icon to Follow me:- twitterTelegramRedditDiscord


The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.

Reference Links(if available):

  •[email protected]/message/5RFDMASVZLFZYBB2GNTZXU6I76E4NA4V/
  •[email protected]/message/PRIPTDA6XINBVEJXI2NGLKVEINBREHTN/
  • CVSS Score (if available)

    v2: / MEDIUMAV:L/AC:L/Au:N/C:P/I:P/A:P

    v3: / HIGHCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

    Links to Exploits(if available)

  • Available for Amazon Prime