Upstream information

CVE-2024-45321 at MITRE

Description

The App::cpanminus package through 1.7047 for Perl downloads code via insecure HTTP, enabling code execution for network attackers.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having critical severity.

CVSS v3 Scores
  CNA (CISA-ADP) National Vulnerability Database
Base Score 9.8 8.1
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector Network Network
Attack Complexity Low High
Privileges Required None None
User Interaction None None
Scope Unchanged Unchanged
Confidentiality Impact High High
Integrity Impact High High
Availability Impact High High
CVSSv3 Version 3.1 3.1
SUSE Bugzilla entry: 1229819 [IN_PROGRESS]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Liberty Linux 9
  • perl-App-cpanminus >= 1.7044-14.1.el9_5
Patchnames:
RHSA-2024:10218
openSUSE Tumbleweed
  • perl-App-cpanminus >= 1.7047-2.1
Patchnames:
openSUSE-Tumbleweed-2024-14291


SUSE Timeline for this CVE

CVE page created: Tue Aug 27 08:00:01 2024
CVE page last modified: Thu Dec 12 12:02:08 2024