CVE-2016-10374
MEDIUMPerltidy < 2016-03-02 - Symlink Following
Title source: ruleDescription
perltidy through 20160302, as used by perlcritic, check-all-the-things, and other software, relies on the current working directory for certain output files and does not have a symlink-attack protection mechanism, which allows local users to overwrite arbitrary files by creating a symlink, as demonstrated by creating a perltidy.ERR symlink that the victim cannot delete.
Scores
CVSS v3
5.5
EPSS
0.0005
EPSS Percentile
14.6%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Details
CWE
CWE-59
Status
published
Products (2)
perltidy_project/perltidy
< 2016-03-02
n/a/n/a
Published
May 17, 2017
Tracked Since
Feb 18, 2026