CVE-2008-2827

perl - Arbitrary File Permission Modification via Symlink Attack in rmtree Function

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2008-2827. PoCs published by Frans Pop.

AI-analyzed exploit summary This exploit demonstrates a local vulnerability in Perl 5.10.0 where the `rmtree` function from `File::Path` incorrectly follows symbolic links, allowing an attacker to change the permissions of arbitrary files. The PoC creates a symbolic link and uses `rmtree` to modify the permissions of the target file.

Description

The rmtree function in lib/File/Path.pm in Perl 5.10 does not properly check permissions before performing a chmod, which allows local users to modify the permissions of arbitrary files via a symlink attack, a different vulnerability than CVE-2005-0448 and CVE-2004-0452.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Frans Pop · textlocallinux
https://www.exploit-db.com/exploits/31959

This exploit demonstrates a local vulnerability in Perl 5.10.0 where the `rmtree` function from `File::Path` incorrectly follows symbolic links, allowing an attacker to change the permissions of arbitrary files. The PoC creates a symbolic link and uses `rmtree` to modify the permissions of the target file.

Classification
Working Poc 100%
Attack Type
Lpe
Complexity
Trivial
Reliability
Reliable
Target: Perl 5.10.0
No auth needed
Prerequisites: Local access to the system · Perl 5.10.0 installed
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (11)

Core 11
Core References
Vendor Advisory vendor-advisory x_refsource_fedora
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01025.html
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/29902
Vendor Advisory vendor-advisory x_refsource_mandriva
http://www.mandriva.com/security/advisories?name=MDVSA-2008:165
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/31687
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://www.securitytracker.com/id?1020373
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/30790
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/30837
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/43308

Scores

EPSS 0.0010
EPSS Percentile 27.3%

Details

CWE
CWE-264
Status published
Products (1)
perl/perl 5.10
Published Jun 23, 2008
Tracked Since Feb 18, 2026