Critical severity9.8NVD Advisory· Published Nov 7, 2017· Updated May 13, 2026
CVE-2008-7319
CVE-2008-7319
Description
The Net::Ping::External extension through 0.15 for Perl does not properly sanitize arguments (e.g., invalid hostnames) containing shell metacharacters before use of backticks in External.pm, allowing for shell command injection and arbitrary command execution if untrusted input is used.
Affected products
1- cpe:2.3:a:net-ping-external_project:net-ping-external:*:*:*:*:*:perl:*:*Range: <=0.15
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- matthias.sdfeu.org/devel/net-ping-external-cmd-injection.patchnvdIssue TrackingPatchThird Party Advisory
- www.openwall.com/lists/oss-security/2017/11/07/4nvdIssue TrackingMailing ListPatchThird Party Advisory
- bugs.debian.org/881097nvdIssue TrackingPatchThird Party Advisory
- rt.cpan.org/Public/Bug/Display.htmlnvdIssue TrackingThird Party Advisory
News mentions
0No linked articles in our index yet.