Unrated severityNVD Advisory· Published Dec 31, 2003· Updated Apr 16, 2026
CVE-2003-1365
CVE-2003-1365
Description
The escape_dangerous_chars function in CGI::Lite 2.0 and earlier does not correctly remove special characters including (1) "\" (backslash), (2) "?", (3) "~" (tilde), (4) "^" (carat), (5) newline, or (6) carriage return, which could allow remote attackers to read or write arbitrary files, or execute arbitrary commands, in shell scripts that rely on CGI::Lite to filter such dangerous inputs.
Affected products
1- cpe:2.3:a:perl:cgi_lite:2.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- archives.neohapsis.com/archives/vulnwatch/2003-q1/0065.htmlnvdExploit
- search.cpan.org/~smylers/CGI-Lite-2.02/Lite.pmnvdExploit
- www.securityfocus.com/archive/1/311414nvdExploit
- securityreason.com/securityalert/3237nvd
- use.perl.org/~cbrooks/journal/10542nvd
- www.securityfocus.com/bid/6833nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/11308nvd
News mentions
0No linked articles in our index yet.