CVE-2010-2253

N/A Unknown
Published: July 06, 2010 Modified: April 29, 2026
View on NVD

Description

lwp-download in libwww-perl before 5.835 does not reject downloads to filenames that begin with a . (dot) character, which allows remote servers to create or overwrite files via (1) a 3xx redirect to a URL with a crafted filename or (2) a Content-Disposition header that suggests a crafted filename, and possibly execute arbitrary code as a consequence of writing to a dotfile in a home directory.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://cpansearch.perl.org/src/GAAS/libwww-perl-5.836/Changes
Source: af854a3a-2127-422b-91ae-364da2661108
http://marc.info/?l=oss-security&m=127411372529485&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://marc.info/?l=oss-security&m=127611288927500&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ocert.org/advisories/ocert-2010-001.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/USN-981-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2010/2872
Source: af854a3a-2127-422b-91ae-364da2661108
https://bugzilla.redhat.com/show_bug.cgi?id=591580
Source: af854a3a-2127-422b-91ae-364da2661108
https://bugzilla.redhat.com/show_bug.cgi?id=602800
Source: af854a3a-2127-422b-91ae-364da2661108

20 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
1.1%
78th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

search.cpan gisle_aas