CVE-2021-36770

7.8 HIGH
Published: August 11, 2021 Modified: November 03, 2025

Description

Encode.pm, as distributed in Perl through 5.34.0, allows local users to gain privileges via a Trojan horse Encode::ConfigLocal library (in the current working directory) that preempts dynamic module loading. Exploitation requires an unusual configuration, and certain 2021 versions of Encode.pm (3.05 through 3.11). This issue occurs because the || operator evaluates @INC in a scalar context, and thus @INC has only an integer value.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://metacpan.org/dist/Encode/changes
Source: cve@mitre.org
Third Party Advisory
https://news.cpanel.com/unscheduled-tsr-10-august-2021/
Source: cve@mitre.org
Third Party Advisory
https://security-tracker.debian.org/tracker/CVE-2021-36770
Source: cve@mitre.org
Third Party Advisory
https://security.netapp.com/advisory/ntap-20210909-0003/
Source: cve@mitre.org
Third Party Advisory
https://github.com/Perl/perl5/commit/c1a937fef07c061600a0078f4cb53fe9c2136bb9
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
https://github.com/dankogai/p5-encode/commit/527e482dc70b035d0df4f8c77a00d81f8d775c74
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
https://metacpan.org/dist/Encode/changes
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://news.cpanel.com/unscheduled-tsr-10-august-2021/
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security-tracker.debian.org/tracker/CVE-2021-36770
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.netapp.com/advisory/ntap-20210909-0003/
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.netapp.com/advisory/ntap-20241108-0002/
Source: af854a3a-2127-422b-91ae-364da2661108

17 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.8 / 10.0
EPSS (Exploit Probability)
0.1%
36th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

p5-encode_project perl fedoraproject