Description
PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial of service (resource consumption) via a crafted URI.
Published: 2007-03-30
Score: 5.0 Medium
EPSS: 17.7% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Ubuntu USN Ubuntu USN USN-488-1 mod_perl vulnerability
References
Link Providers
ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2007-0395.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2008-0630.html cve-icon cve-icon
http://secunia.com/advisories/24678 cve-icon cve-icon
http://secunia.com/advisories/24839 cve-icon cve-icon
http://secunia.com/advisories/25072 cve-icon cve-icon
http://secunia.com/advisories/25110 cve-icon cve-icon
http://secunia.com/advisories/25432 cve-icon cve-icon
http://secunia.com/advisories/25655 cve-icon cve-icon
http://secunia.com/advisories/25730 cve-icon cve-icon
http://secunia.com/advisories/25894 cve-icon cve-icon
http://secunia.com/advisories/26084 cve-icon cve-icon
http://secunia.com/advisories/26231 cve-icon cve-icon
http://secunia.com/advisories/26290 cve-icon cve-icon
http://secunia.com/advisories/31490 cve-icon cve-icon
http://secunia.com/advisories/31493 cve-icon cve-icon
http://secunia.com/advisories/33720 cve-icon cve-icon
http://secunia.com/advisories/33723 cve-icon cve-icon
http://security.gentoo.org/glsa/glsa-200705-04.xml cve-icon cve-icon
http://sunsolve.sun.com/search/document.do?assetkey=1-66-248386-1 cve-icon cve-icon
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021508.1-1 cve-icon cve-icon
http://support.avaya.com/elmodocs2/security/ASA-2007-293.htm cve-icon cve-icon
http://svn.apache.org/repos/asf/perl/modperl/branches/1.x/Changes cve-icon cve-icon
http://www.gossamer-threads.com/lists/modperl/modperl/92739 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2007:083 cve-icon cve-icon
http://www.novell.com/linux/security/advisories/2007_12_sr.html cve-icon cve-icon
http://www.novell.com/linux/security/advisories/2007_8_sr.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2007-0396.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2007-0486.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2008-0261.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2008-0627.html cve-icon cve-icon
http://www.securityfocus.com/bid/23192 cve-icon cve-icon
http://www.securitytracker.com/id?1018259 cve-icon cve-icon
http://www.trustix.org/errata/2007/0023/ cve-icon cve-icon
http://www.ubuntu.com/usn/usn-488-1 cve-icon cve-icon
http://www.vupen.com/english/advisories/2007/1150 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/33312 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2007-1349 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10987 cve-icon cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8349 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2007-1349 cve-icon
History

No history.

Subscriptions

Apache Mod Perl
Canonical Ubuntu Linux
Redhat Certificate System Enterprise Linux Enterprise Linux Desktop Enterprise Linux Eus Enterprise Linux Server Enterprise Linux Workstation Network Proxy Network Satellite Rhel Application Stack Satellite
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-07T12:50:35.306Z

Reserved: 2007-03-08T00:00:00.000Z

Link: CVE-2007-1349

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2007-03-30T00:19:00.000

Modified: 2025-04-09T00:30:58.490

Link: CVE-2007-1349

cve-icon Redhat

Severity : Moderate

Publid Date: 2007-03-22T00:00:00Z

Links: CVE-2007-1349 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses