Lucene search

K
cvelistMitreCVELIST:CVE-2016-10374
HistoryMay 17, 2017 - 7:00 p.m.

CVE-2016-10374

2017-05-1719:00:00
mitre
www.cve.org
4
perltidy
vulnerability
local users
overwrite
arbitrary files
symlink
symlink attack

AI Score

5.3

Confidence

High

EPSS

0

Percentile

5.1%

perltidy through 20160302, as used by perlcritic, check-all-the-things, and other software, relies on the current working directory for certain output files and does not have a symlink-attack protection mechanism, which allows local users to overwrite arbitrary files by creating a symlink, as demonstrated by creating a perltidy.ERR symlink that the victim cannot delete.

AI Score

5.3

Confidence

High

EPSS

0

Percentile

5.1%