CVE-2002-1742

SOAP::Lite 0.50 through 0.52 allows remote attackers to load arbitrary Perl functions by suppling a non-existent function in a script using a SOAP::Lite module, which causes the AUTOLOAD subroutine to trigger.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:paul_kulchenko:soap_lite:0.50:*:*:*:*:*:*:*
cpe:2.3:a:paul_kulchenko:soap_lite:0.51:*:*:*:*:*:*:*
cpe:2.3:a:paul_kulchenko:soap_lite:0.52:*:*:*:*:*:*:*

History

20 Nov 2024, 23:42

Type Values Removed Values Added
References () ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SN-02%3A02.asc - Vendor Advisory () ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SN-02%3A02.asc - Vendor Advisory
References () http://online.securityfocus.com/archive/1/267051 - () http://online.securityfocus.com/archive/1/267051 -
References () http://use.perl.org/articles/02/04/09/000212.shtml?tid=5 - Patch () http://use.perl.org/articles/02/04/09/000212.shtml?tid=5 - Patch
References () http://www.phrack.com/show.php?p=58&a=9 - () http://www.phrack.com/show.php?p=58&a=9 -
References () http://www.phrack.org/show.php?p=58&a=9 - Vendor Advisory () http://www.phrack.org/show.php?p=58&a=9 - Vendor Advisory
References () http://www.securityfocus.com/bid/4493 - Patch () http://www.securityfocus.com/bid/4493 - Patch
References () http://www.soaplite.com/ - Patch () http://www.soaplite.com/ - Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/8838 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/8838 -

Information

Published : 2002-12-31 05:00

Updated : 2025-04-03 01:03


NVD link : CVE-2002-1742

Mitre link : CVE-2002-1742

CVE.ORG link : CVE-2002-1742


JSON object : View

Products Affected

paul_kulchenko

  • soap_lite