CVE-2012-5526

CGI.pm module before 3.63 for Perl does not properly escape newlines in (1) Set-Cookie or (2) P3P headers, which might allow remote attackers to inject arbitrary headers into responses from applications that use CGI.pm.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:N/I:P/A:N
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 81%
VendorProductVersion
andy_armstrongcgi.pm
𝑥
≤ 3.62
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libcgi-pm-perl
bullseye
4.51-1
fixed
bookworm
4.55-1
fixed
sid
4.66-1
fixed
trixie
4.66-1
fixed
perl
bullseye
5.32.1-4+deb11u3
fixed
bullseye (security)
5.32.1-4+deb11u4
fixed
bookworm
5.36.0-7+deb12u1
fixed
sid
5.40.0-6
fixed
trixie
5.40.0-6
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libcgi-pm-perl
zesty
not-affected
yakkety
not-affected
xenial
not-affected
wily
not-affected
vivid
not-affected
utopic
not-affected
trusty
dne
saucy
not-affected
raring
ignored
quantal
ignored
precise
ignored
oneiric
ignored
lucid
ignored
hardy
dne
perl
zesty
not-affected
yakkety
not-affected
xenial
not-affected
wily
not-affected
vivid
not-affected
utopic
not-affected
trusty
not-affected
saucy
not-affected
raring
not-affected
quantal
Fixed 5.14.2-13ubuntu0.1
released
precise
Fixed 5.14.2-6ubuntu2.2
released
oneiric
Fixed 5.12.4-4ubuntu0.1
released
lucid
Fixed 5.10.1-8ubuntu2.2
released
hardy
Fixed 5.8.8-12ubuntu0.7
released
Common Weakness Enumeration