Lucene search

K
cveRedhatCVE-2013-4407
HistoryNov 23, 2013 - 6:55 p.m.

CVE-2013-4407

2013-11-2318:55:04
redhat
web.nvd.nist.gov
110
cve-2013-4407
http::body::multipart
perl
security vulnerability
nvd

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

AI Score

6.3

Confidence

Low

EPSS

0.016

Percentile

87.5%

HTTP::Body::Multipart in the HTTP-Body module for Perl (1.07 through 1.22, before 1.23) uses the part of the uploaded file’s name after the first “.” character as the suffix of a temporary file, which makes it easier for remote attackers to conduct attacks by leveraging subsequent behavior that may assume the suffix is well-formed.

Affected configurations

Nvd
Node
http-body_projecthttp-bodyRange1.17
OR
http-body_projecthttp-bodyMatch0.01
OR
http-body_projecthttp-bodyMatch0.2
OR
http-body_projecthttp-bodyMatch0.03
OR
http-body_projecthttp-bodyMatch0.4
OR
http-body_projecthttp-bodyMatch0.5
OR
http-body_projecthttp-bodyMatch0.6
OR
http-body_projecthttp-bodyMatch0.7
OR
http-body_projecthttp-bodyMatch0.8
OR
http-body_projecthttp-bodyMatch0.9
OR
http-body_projecthttp-bodyMatch1.00
OR
http-body_projecthttp-bodyMatch1.01
OR
http-body_projecthttp-bodyMatch1.02
OR
http-body_projecthttp-bodyMatch1.03
OR
http-body_projecthttp-bodyMatch1.04
OR
http-body_projecthttp-bodyMatch1.05
OR
http-body_projecthttp-bodyMatch1.06
OR
http-body_projecthttp-bodyMatch1.07
OR
http-body_projecthttp-bodyMatch1.08
OR
http-body_projecthttp-bodyMatch1.09
OR
http-body_projecthttp-bodyMatch1.10
OR
http-body_projecthttp-bodyMatch1.11
OR
http-body_projecthttp-bodyMatch1.12
OR
http-body_projecthttp-bodyMatch1.14
OR
http-body_projecthttp-bodyMatch1.15
OR
http-body_projecthttp-bodyMatch1.16
VendorProductVersionCPE
http-body_projecthttp-body*cpe:2.3:a:http-body_project:http-body:*:*:*:*:*:*:*:*
http-body_projecthttp-body0.01cpe:2.3:a:http-body_project:http-body:0.01:*:*:*:*:*:*:*
http-body_projecthttp-body0.2cpe:2.3:a:http-body_project:http-body:0.2:*:*:*:*:*:*:*
http-body_projecthttp-body0.03cpe:2.3:a:http-body_project:http-body:0.03:*:*:*:*:*:*:*
http-body_projecthttp-body0.4cpe:2.3:a:http-body_project:http-body:0.4:*:*:*:*:*:*:*
http-body_projecthttp-body0.5cpe:2.3:a:http-body_project:http-body:0.5:*:*:*:*:*:*:*
http-body_projecthttp-body0.6cpe:2.3:a:http-body_project:http-body:0.6:*:*:*:*:*:*:*
http-body_projecthttp-body0.7cpe:2.3:a:http-body_project:http-body:0.7:*:*:*:*:*:*:*
http-body_projecthttp-body0.8cpe:2.3:a:http-body_project:http-body:0.8:*:*:*:*:*:*:*
http-body_projecthttp-body0.9cpe:2.3:a:http-body_project:http-body:0.9:*:*:*:*:*:*:*
Rows per page:
1-10 of 261

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

AI Score

6.3

Confidence

Low

EPSS

0.016

Percentile

87.5%