Summary

Netsparker identified a Remote Code Evaluation (Perl) by capturing a DNS A request, which occurs when input data is run as code.

This is a highly critical issue and should be addressed as soon as possible.

Impact
An attacker can execute arbitrary Perl code on the system. The attacker may also be able to execute arbitrary system commands.
Remediation
Do not accept input from end users that will be directly interpreted as source code. If this is a business requirement, validate all the input on the application and remove all the data that could be directly interpreted as Perl source code.
Required Skills for Successful Exploitation
This vulnerability is not difficult to leverage. Perl is a high level language for which there are vast resources available. Successful exploitation requires knowledge of the programming language, access to the source code or the ability to produce source code for use in such attacks, and minimal attack skills.
Classifications
PCI v3.1-6.5.1, PCI v3.2-6.5.1, CAPEC-23, OWASP 2013-A1 , CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Vulnerability Index

Vulnerability Index

You can search and find all vulnerabilities

Select Category

OR

Search Vulnerability

;
Netsparker

Dead accurate, fast & easy-to-use Web Application Security Scanner

GET A DEMO