Encode.pm, as distributed in Perl through 5.34.0, allows...
High severity
Unreviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Jan 30, 2023
Description
Published by the National Vulnerability Database
Aug 11, 2021
Published to the GitHub Advisory Database
May 24, 2022
Last updated
Jan 30, 2023
Encode.pm, as distributed in Perl through 5.34.0, allows local users to gain privileges via a Trojan horse Encode::ConfigLocal library (in the current working directory) that preempts dynamic module loading. Exploitation requires an unusual configuration, and certain 2021 versions of Encode.pm (3.05 through 3.11). This issue occurs because the || operator evaluates @inc in a scalar context, and thus @inc has only an integer value.
References