CVE-2012-5526

EUVD-2012-5418
CGI.pm module before 3.63 for Perl does not properly escape newlines in (1) Set-Cookie or (2) P3P headers, which might allow remote attackers to inject arbitrary headers into responses from applications that use CGI.pm.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:N/I:P/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 82%
Affected Products (NVD)
VendorProductVersion
andy_armstrongcgi.pm
𝑥
≤ 3.62
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libcgi-pm-perl
bookworm
4.55-1
fixed
bullseye
4.51-1
fixed
sid
4.66-1
fixed
trixie
4.66-1
fixed
perl
bookworm
5.36.0-7+deb12u1
fixed
bullseye
5.32.1-4+deb11u3
fixed
bullseye (security)
5.32.1-4+deb11u4
fixed
sid
5.40.0-6
fixed
trixie
5.40.0-6
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libcgi-pm-perl
hardy
dne
lucid
ignored
oneiric
ignored
precise
ignored
quantal
ignored
raring
ignored
saucy
not-affected
trusty
dne
utopic
not-affected
vivid
not-affected
wily
not-affected
xenial
not-affected
yakkety
not-affected
zesty
not-affected
perl
hardy
Fixed 5.8.8-12ubuntu0.7
released
lucid
Fixed 5.10.1-8ubuntu2.2
released
oneiric
Fixed 5.12.4-4ubuntu0.1
released
precise
Fixed 5.14.2-6ubuntu2.2
released
quantal
Fixed 5.14.2-13ubuntu0.1
released
raring
not-affected
saucy
not-affected
trusty
not-affected
utopic
not-affected
vivid
not-affected
wily
not-affected
xenial
not-affected
yakkety
not-affected
zesty
not-affected
Common Weakness Enumeration