Files
CVEs-PoC/2016/CVE-2016-6185.md
2025-09-29 21:09:30 +02:00

20 lines
843 B
Markdown

### [CVE-2016-6185](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6185)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen)
### Description
The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.
### POC
#### Reference
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- https://rt.cpan.org/Public/Bug/Display.html?id=115808
#### Github
- https://github.com/404notf0und/CVE-Flow
- https://github.com/IBM/buildingimages