Command Injection Vulnerability in libpoe-component-irc-perl by POE
CVE-2010-3438
9.8CRITICAL
Summary
The libpoe-component-irc-perl library, up to version 6.32, is susceptible to a command injection vulnerability due to inadequate handling of carriage returns and line feeds. An attacker can exploit this flaw by crafting malicious input containing unexpected control characters, enabling them to execute arbitrary IRC commands. For instance, passing the argument 'some text\rQUIT' to the 'privmsg' handler can result in the client's unexpected disconnection from the IRC server, which poses significant risks to systems relying on this library. Proper validation and sanitization practices are essential to mitigate this risk.
Affected Version(s)
libpoe-component-irc-perl before v6.32
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved