Impact
Crypt::DSA versions up to 1.19 make use of Perl’s two‑argument open, which permits the modification of files that already exist. This flaw allows an attacker who can influence the parameters passed to the module to overwrite files such as private keys or configuration data, thereby compromising the integrity of the application or system.
Affected Systems
The affected product is TIMLEGGE’s Crypt::DSA Perl module through version 1.19. Systems running any of these versions of Crypt::DSA without an upgrade to 1.20 are vulnerable.
Risk and Exploitability
No CVSS or EPSS score is reported and the vulnerability is not listed in the CISA KEV catalog. The flaw can be exploited by an attacker who controls the environment in which Crypt::DSA operates, enabling file modifications that may impact confidentiality, integrity, or availability. The attack vector is likely local or through code that feeds input to Crypt::DSA.
OpenCVE Enrichment