Command Injection Vulnerability in libpoe-component-irc-perl by POE
CVE-2010-3438

9.8CRITICAL

Key Information:

Vendor
CVE Published:
12 November 2019

Summary

The libpoe-component-irc-perl library, up to version 6.32, is susceptible to a command injection vulnerability due to inadequate handling of carriage returns and line feeds. An attacker can exploit this flaw by crafting malicious input containing unexpected control characters, enabling them to execute arbitrary IRC commands. For instance, passing the argument 'some text\rQUIT' to the 'privmsg' handler can result in the client's unexpected disconnection from the IRC server, which poses significant risks to systems relying on this library. Proper validation and sanitization practices are essential to mitigate this risk.

Affected Version(s)

libpoe-component-irc-perl before v6.32

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2010-3438 : Command Injection Vulnerability in libpoe-component-irc-perl by POE | SecurityVulnerability.io