Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 371306 (CVE-2011-2201) - dev-perl/Data-FormValidator: Form validation bypass and info leak vulnerability (CVE-2011-2201)
Summary: dev-perl/Data-FormValidator: Form validation bypass and info leak vulnerabili...
Status: RESOLVED FIXED
Alias: CVE-2011-2201
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL: https://rt.cpan.org/Public/Bug/Displa...
Whiteboard: ~4 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2011-06-12 20:33 UTC by Tim Sammut (RETIRED)
Modified: 2013-09-03 18:21 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Tim Sammut (RETIRED) gentoo-dev 2011-06-12 20:33:45 UTC
From the upstream bug at $URL:

When untaint_all_constraints is used, D::F::Results reports an
invalid field as valid. The content is the last successful regexp
match, which may be absolutely unrelated to DFV. I reproduced
the bug with the attached script using Perl 5.12.1 and DFV 4.66 on
a Debian Lenny system.

I believe the problem is in line 809 of D::F::Results:

my ($match) = scalar ($val =~ $re);
if ($untaint_this && defined $match) {
# pass the value through a RE that matches anything to untaint it.
my ($untainted) = ($& =~ m/(.*)/s);
return $untainted;
}

The "scalar" has been added between 4.61 and 4.66. Even if $re
does not match, the scalar returns a defined value, which leads
into an old $& being used.
Comment 1 GLSAMaker/CVETool Bot gentoo-dev 2011-10-07 22:35:37 UTC
CVE-2011-2201 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2201):
  The Data::FormValidator module 4.66 and earlier for Perl, when
  untaint_all_constraints is enabled, does not properly preserve the taint
  attribute of data, which might allow remote attackers to bypass the taint
  protection mechanism via form input.
Comment 2 Chris Reffett (RETIRED) gentoo-dev Security 2013-09-03 18:21:59 UTC
No affected versions in tree, ~ only. Closing noglsa.