CVE-2011-10007
Linux Debian vulnerability analysis and mitigation

Overview

CVE-2011-10007 affects File::Find::Rule through version 0.34 for Perl. The vulnerability allows arbitrary code execution when the grep() function encounters a crafted filename. The issue was initially reported as a file truncation bug in January 2011 but was later identified as a security vulnerability in June 2025. The vulnerability stems from using the 2-argument form of open(), which allows an attacker-controlled filename to provide the MODE parameter, enabling command execution (OSS Security).

Technical details

The vulnerability exists in the grep() function implementation where a file handle is opened using the 2-argument form of open(). This implementation allows an attacker to control the MODE parameter through a crafted filename, effectively turning the filename into a command to be executed. The vulnerability is classified as CWE-78 (Improper Neutralization of Special Elements used in an OS Command). A proof of concept demonstrates the vulnerability by creating a file with a pipe character in its name: mkdir /tmp/poc; echo > "/tmp/poc/|id", which when processed by the vulnerable code executes the id command (OSS Security, NVD).

Impact

The vulnerability allows attackers to execute arbitrary commands on the affected system through specially crafted filenames. This can lead to unauthorized command execution with the privileges of the user running the Perl script. The CVSS 3.1 base score is 8.8 (HIGH), with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, indicating high potential impact on confidentiality, integrity, and availability (NVD).

Mitigation and workarounds

A patch has been released that fixes the vulnerability by changing to the 3-argument form of open(). Users should update to the fixed version when available, apply the provided patch, or use a patched version provided by their OS distribution. Debian has released security updates (DLA-4209-1 for bullseye and DSA-5936-1 for bookworm) to address this vulnerability (Debian Security, GitHub Patch).

Community reactions

The vulnerability has sparked discussions about the security implications of Perl's 2-argument form of open(). A broader discussion has been initiated on the perl5-porters mailing list regarding the future of 2-argument open in Perl (OSS Security).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management