SOAP::Lite 0.50 through 0.52 allows remote attackers to load arbitrary Perl functions by suppling a non-existent function in a script using a SOAP::Lite module, which causes the AUTOLOAD subroutine to trigger.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:42
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SN-02%3A02.asc - Vendor Advisory | |
References | () http://online.securityfocus.com/archive/1/267051 - | |
References | () http://use.perl.org/articles/02/04/09/000212.shtml?tid=5 - Patch | |
References | () http://www.phrack.com/show.php?p=58&a=9 - | |
References | () http://www.phrack.org/show.php?p=58&a=9 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/4493 - Patch | |
References | () http://www.soaplite.com/ - Patch | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/8838 - |
Information
Published : 2002-12-31 05:00
Updated : 2025-04-03 01:03
NVD link : CVE-2002-1742
Mitre link : CVE-2002-1742
CVE.ORG link : CVE-2002-1742
JSON object : View
Products Affected
paul_kulchenko
- soap_lite
CWE