Description
Encode.pm, as distributed in Perl through 5.34.0, allows local users to gain privileges via a Trojan horse Encode::ConfigLocal library (in the current working directory) that preempts dynamic module loading. Exploitation requires an unusual configuration, and certain 2021 versions of Encode.pm (3.05 through 3.11). This issue occurs because the || operator evaluates @INC in a scalar context, and thus @INC has only an integer value.
Published: 2021-08-11
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-23358 Encode.pm, as distributed in Perl through 5.34.0, allows local users to gain privileges via a Trojan horse Encode::ConfigLocal library (in the current working directory) that preempts dynamic module loading. Exploitation requires an unusual configuration, and certain 2021 versions of Encode.pm (3.05 through 3.11). This issue occurs because the || operator evaluates @INC in a scalar context, and thus @INC has only an integer value.
Ubuntu USN Ubuntu USN USN-5033-1 Perl vulnerability
History

Mon, 03 Nov 2025 22:30:00 +0000

Type Values Removed Values Added
References

Subscriptions

Fedoraproject Fedora
P5-encode Project P5-encode
Perl Perl
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-11-03T21:45:03.119Z

Reserved: 2021-07-17T00:00:00.000Z

Link: CVE-2021-36770

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-08-11T23:15:07.707

Modified: 2025-11-03T22:15:49.640

Link: CVE-2021-36770

cve-icon Redhat

Severity : Important

Publid Date: 2021-08-09T00:00:00Z

Links: CVE-2021-36770 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses