This Metasploit module exploits a feature of Splunk whereby a custom application can be uploaded through the web based interface. Through the 'script' search command a user can call commands defined in their custom application which includes arbitrary perl or python code. To abuse this behavior, a valid Splunk user with the admin role is required. By default, this module uses the credential of "admin:changeme", the default Administrator credential for Splunk. Note that the Splunk web interface runs as SYSTEM on Windows, or as root on Linux by default. This Metasploit module has only been tested successfully against Splunk 5.0.
638c1ea3c9f99886762f0c13cc824ca25fe4fd419cf32123b703084f0680888f
Secunia Security Advisory - Two vulnerabilities have been reported in Locale::Maketext module for Perl, which can be exploited by malicious users to compromise an application using the module.
88d56c48681844bbb4a4c42c2e99559a927ea838f03125103284763b4d23533c
Secunia Security Advisory - Ubuntu has issued an update for perl. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.
42a2c747ae2a87b136f8cf0be7cc4b96316238e5dda9354e6598df69c8ac512c
This Metasploit module abuses a lack of authorization in the NetIQ Privileged User Manager service (unifid.exe) to execute arbitrary perl code. The problem exists in the ldapagnt module. The module has been tested successfully on NetIQ PUM 2.3.1 over Windows 2003 SP2, which allows to execute arbitrary code with SYSTEM privileges.
f79aa10f08abac5de98e9a1207c3259575b8c431b2e93a15ad5ebc8cf3d70dee
ISME is a small framework to test IP phones from several editors. It can gather information from IP phone infrastructures, test their web servers for default login/password combinations, and also implement attacks against the systems. ISME has been written in perl with a perl/Tk interface to provide a portable and easy to use tool. Full documentation is also provided.
005bb4e3debe6a2d061f32cac8be7405b70d70dd01daa3593789c1e34a3b464e
Novell NetIQ Privileged User Manager version 2.3.1 suffers from a perl code evaluation remote command execution vulnerability in ldapagnt_eval() in ldapagnt.dll. The secure web interface contains a flaw which allows, without prior authentication, to execute a Perl script with SYSTEM privileges. This can be done by sending a POST request with well formed data. Full exploit included.
f2677910b884afa12ade6e175014677e91e4db77215c215f570b78204891f70b
360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.
8680b4e7358b1f8228ccc1ad72f65c83c7889eadc6a887adb27b060b96b044df
360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.
a3fb818edceec758687fba61efce8b7819eef7b0a180ab390d69fb0cc2604681
360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.
58897c316cdef316065b209473124c0e33020bd1864acd23219ecb8c9c3df0bf
360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.
83a14cd01c162dbb2b4f78021b1b6a8d2a95fc60ef2cb2d383c7c55458a39622
The Perl 5 interpreter is vulnerable to a memory corruption vulnerability which results in memory disclosure and potentially arbitrary code execution when large values are supplied to the x operator.
553cb435fb55599355ceae80210dcc60509e0f1a51cae7259ce1394e8ef9ac7b
360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.
d9fb0acb155f64254f747054284f388236ebe887cd473089b6502874ce95d0d0
360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.
00af73a5723ae49d0e382b3f6a620781e28c8f7c00bc60484f760918af576d92
Secunia Security Advisory - Oracle has acknowledged a vulnerability in Perl included in Solaris, which can be exploited by malicious people to conduct HTTP response splitting attacks in an application using the library.
2bdc292369ad9f4161ed611531974d706929099e0603932ec86a3cd43b842917
360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.
73a58198a8995d01eb38a8a4e8e298fc639af8d7e3d23ed6ebffa7cdcd081379
360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.
cff15dcf5626494896c8a6d4970b7acec184525f959e7e6f3a3be6163debc79b
This perl script leverages /proc/self/environ to attempt getting code execution out of a local file inclusion vulnerability.
bd77eecfb380be0b2302b89fd25fafe9ee987dadd671f7e40d057f74b0ce0ade
360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.
eca2eafd31b73f79158ba4318dcdb341d71a40f8cdc578fd284dec7337fc4348
360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.
8700cbc53fa4f7a79694f34b2bf1094776e977cd3e78a39a4cef4635ac1697b6
360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.
f05e778f24d0f3d667c664af3819612b34157e5fa6a0c9419df2282a58ea676e
360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.
d5b8d27f99acdf525362b164557638cfc9cca4a0fa9a3e88299565b9c890caec
360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.
a8af9a4806465b18cd3cb04ff8798af3257fd0cfdb61642e04c8cd8f73566b47
ISME is a small framework to test IP phones from several editors. It can gather information from IP phone infrastructures, test their web servers for default login/password combinations, and also implement attacks against the systems. ISME has been written in perl with a perl/Tk interface to provide a portable and easy to use tool. Full documentation is also provided.
052944b549e2c683c0e76cceb786430d87744dc8c6db6eb95c053a158d07f5a5
Secunia Security Advisory - Ubuntu has issued an update for libconfig-inifiles-perl. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges.
29be3fbd5004650e559b27e5be365ffd03418493f176d677c36b6c20b6a70cff
Ubuntu Security Notice 1543-1 - It was discovered that the perl Config::IniFiles module created temporary files in an unsafe manner. A local user with write access to the directory containing a configuration file that Config-IniFiles manipulates could exploit this to overwrite arbitrary files.
53f59f33b4b7260067b809db7a270c28dc07def87a2cab40d4971d8d23a2bf82