Name | CVE-2012-5526 |
Description | CGI.pm module before 3.63 for Perl does not properly escape newlines in (1) Set-Cookie or (2) P3P headers, which might allow remote attackers to inject arbitrary headers into responses from applications that use CGI.pm. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-2586-1, DSA-2587-1 |
Debian Bugs | 693420, 693421 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
libcgi-pm-perl (PTS) | bullseye | 4.51-1 | fixed |
| bookworm | 4.55-1 | fixed |
| sid, trixie | 4.66-1 | fixed |
perl (PTS) | bullseye | 5.32.1-4+deb11u3 | fixed |
| bullseye (security) | 5.32.1-4+deb11u1 | fixed |
| bookworm | 5.36.0-7+deb12u1 | fixed |
| sid, trixie | 5.38.2-5 | fixed |
The information below is based on the following data on fixed versions.
Notes
http://cpansearch.perl.org/src/MARKSTOS/CGI.pm-3.63/Changes
https://github.com/markstos/CGI.pm/pull/23
https://bugzilla.redhat.com/show_bug.cgi?id=877015