漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
GRID::Machine versions through 0.127 for Perl allows arbitrary code execution via unsafe deserialization
Vulnerability Description
GRID::Machine versions through 0.127 for Perl allows arbitrary code execution via unsafe deserialization. GRID::Machine provides Remote Procedure Calls (RPC) over SSH for Perl. The client connects to remote hosts to execute code on them. A compromised or malicious remote host can execute arbitrary code back on the client through unsafe deserialization in the RPC protocol. read_operation() in lib/GRID/Machine/Message.pm deserialises values from the remote side using eval() $arg .= '$VAR1'; my $val = eval "no strict; $arg"; # line 40-41 $arg is raw bytes from the protocol pipe. A compromised remote host can embed arbitrary perl in the Dumper-formatted response: $VAR1 = do { system("..."); }; This executes on the client silently on every RPC call, as the return values remain correct. This functionality is by design but the trust requirement for the remote host is not documented in the distribution.
CVSS Information
N/A
Vulnerability Type
可信数据的反序列化
Vulnerability Title
GRID::Machine 安全漏洞
Vulnerability Description
GRID::Machine是Openwall开源的一个用于分布式任务调度与远程执行的Perl模块。 GRID::Machine 0.127及之前版本存在安全漏洞,该漏洞源于不安全的反序列化,可能导致任意代码执行。
CVSS Information
N/A
Vulnerability Type
N/A