First published: Wed Jun 27 2001(Updated: )
Directory traversal vulnerability in cal_make.pl in PerlCal allows remote attackers to read arbitrary files via a .. (dot dot) in the p0 parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Acme Labs Perlcal | =2.13 | |
Acme Labs Perlcal | =2.9c | |
Acme Labs Perlcal | =2.9 | |
Acme Labs Perlcal | =2.9b | |
Acme Labs Perlcal | =2.9e | |
Acme Labs Perlcal | =2.80 | |
Acme Labs Perlcal | =2.4 | |
Acme Labs Perlcal | =2.9d | |
Acme Labs Perlcal | =2.7 | |
Acme Labs Perlcal | =2.95 | |
Acme Labs Perlcal | =2.6 | |
Acme Labs Perlcal | =2.3 | |
Acme Labs Perlcal | =2.5 | |
Acme Labs Perlcal | =2.9a | |
Acme Labs Perlcal | =2.18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0463 is considered a high-severity vulnerability due to its exploitation potential through directory traversal.
To fix CVE-2001-0463, you should update PerlCal to the latest version where the vulnerability is patched.
PerlCal versions 2.3, 2.4, 2.6, 2.7, 2.80, 2.9a through 2.9e, and 2.13 are affected by CVE-2001-0463.
Yes, CVE-2001-0463 allows remote attackers to read arbitrary files, which can lead to unauthorized access to sensitive information.
If updating is not possible, consider implementing security measures such as input validation and web application firewall rules to mitigate the risk of CVE-2001-0463.