Apache Mod Perl vulnerabilities
3 known vulnerabilities affecting apache/mod_perl.
Total CVEs
3
CISA KEV
0
Public exploits
1
Exploited in wild
0
Severity breakdown
CRITICAL1MEDIUM1LOW1
Vulnerabilities
Page 1 of 1
CVE-2011-2767CRITICALCVSS 9.8≥ 2.0.0, ≤ 2.0.102018-08-26
CVE-2011-2767 [CRITICAL] CWE-94 CVE-2011-2767: mod_perl 2.0 through 2.0.10 allows attackers to execute arbitrary Perl code by placing it in a user-
mod_perl 2.0 through 2.0.10 allows attackers to execute arbitrary Perl code by placing it in a user-owned .htaccess file, because (contrary to the documentation) there is no configuration option that permits Perl code for the administrator's control of HTTP request processing without also permitting unprivileged users to run Perl code in the context
nvd
CVE-2009-0796LOWCVSS 2.6PoCv1v22009-04-07
CVE-2009-0796 [LOW] CWE-79 CVE-2009-0796: Cross-site scripting (XSS) vulnerability in Status.pm in Apache::Status and Apache2::Status in mod_p
Cross-site scripting (XSS) vulnerability in Status.pm in Apache::Status and Apache2::Status in mod_perl1 and mod_perl2 for the Apache HTTP Server, when /perl-status is accessible, allows remote attackers to inject arbitrary web script or HTML via the URI.
nvd
CVE-2007-1349MEDIUMCVSS 5.0fixed in 1.30≥ 2.0.0, ≤ 2.0.112007-03-30
CVE-2007-1349 [MEDIUM] CWE-20 CVE-2007-1349: PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly
PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial of service (resource consumption) via a crafted URI.
nvd