Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 371306 (CVE-2011-2201)

Summary: dev-perl/Data-FormValidator: Form validation bypass and info leak vulnerability (CVE-2011-2201)
Product: Gentoo Security Reporter: Tim Sammut (RETIRED) <underling>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: trivial CC: alexanderyt, perl
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://rt.cpan.org/Public/Bug/Display.html?id=61792
Whiteboard: ~4 [noglsa]
Package list:
Runtime testing required: ---

Description Tim Sammut (RETIRED) gentoo-dev 2011-06-12 20:33:45 UTC
From the upstream bug at $URL:

When untaint_all_constraints is used, D::F::Results reports an
invalid field as valid. The content is the last successful regexp
match, which may be absolutely unrelated to DFV. I reproduced
the bug with the attached script using Perl 5.12.1 and DFV 4.66 on
a Debian Lenny system.

I believe the problem is in line 809 of D::F::Results:

my ($match) = scalar ($val =~ $re);
if ($untaint_this && defined $match) {
# pass the value through a RE that matches anything to untaint it.
my ($untainted) = ($& =~ m/(.*)/s);
return $untainted;
}

The "scalar" has been added between 4.61 and 4.66. Even if $re
does not match, the scalar returns a defined value, which leads
into an old $& being used.
Comment 1 GLSAMaker/CVETool Bot gentoo-dev 2011-10-07 22:35:37 UTC
CVE-2011-2201 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2201):
  The Data::FormValidator module 4.66 and earlier for Perl, when
  untaint_all_constraints is enabled, does not properly preserve the taint
  attribute of data, which might allow remote attackers to bypass the taint
  protection mechanism via form input.
Comment 2 Chris Reffett (RETIRED) gentoo-dev Security 2013-09-03 18:21:59 UTC
No affected versions in tree, ~ only. Closing noglsa.