Download Netsparker
Pricing
Blog
Contact
Netsparker

Perl Remote Code Evaluation Web Vulnerability

Netsparker identified a possible remote code (Perl) evaluation, which occurs when input data is run as code.

Even though Netsparker believes there is a remote code (Perl) evaluation in here, it could not confirm it. There can be numerous reasons for Netsparker not being able to confirm it. We strongly recommend you investigate the issue manually to ensure it is a remote code (Perl) evaluation and needs to be addressed.

Impact

An attacker can execute arbitrary Perl code on the system. The attacker may also be able to execute arbitrary system commands.

Remedy

Do not accept input from end users that will be directly interpreted as source code. If this is a business requirement, validate all input to the application by removing any data that could be directly interpreted as Perl source code.

Required Skills for Successful Exploitation

This vulnerability is not difficult to leverage. Perl is a high level language for which there are vast resources available. Successful exploitation requires knowledge of the programming language, access to the source code or the ability to produce source code for use in such attacks, and minimal attack skills.

External References


Go back to the Complete list of Vulnerability Checks.