First published: Sun Jun 12 2011(Updated: )
It was found that perl-Data-FormValidator, a HTML form user input validator, used to treat certain invalid fields as valid, when the untaint_all_constraints directive was used (default for majority of Data-FormValidator routines). A remote attacker could use this flaw to bypass perl Taint mode protection mechanism via specially-crafted input provided to the HTML form. References: [1] <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629511">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629511</a> [2] <a href="https://rt.cpan.org/Public/Bug/Display.html?id=61792">https://rt.cpan.org/Public/Bug/Display.html?id=61792</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
mark stosberg data\ | <=4.66 | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
mark stosberg data\ | =\-formvalidator | |
Perl |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2201 is considered a moderate severity vulnerability due to its potential to allow attackers to bypass input validation.
To fix CVE-2011-2201, update to a patched version of perl-Data-FormValidator that addresses this vulnerability.
CVE-2011-2201 affects all versions of perl-Data-FormValidator up to and including version 4.66.
Yes, CVE-2011-2201 can be exploited remotely by an attacker to bypass input validation.
CVE-2011-2201 is an input validation flaw that occurs when certain invalid fields are treated as valid.