Description
mod_perl 2.0 through 2.0.10 allows attackers to execute arbitrary Perl code by placing it in a user-owned .htaccess file, because (contrary to the documentation) there is no configuration option that permits Perl code for the administrator's control of HTTP request processing without also permitting unprivileged users to run Perl code in the context of the user account that runs Apache HTTP Server processes.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1507-1 | libapache2-mod-perl2 security update |
EUVD |
EUVD-2011-2741 | mod_perl 2.0 through 2.0.10 allows attackers to execute arbitrary Perl code by placing it in a user-owned .htaccess file, because (contrary to the documentation) there is no configuration option that permits Perl code for the administrator's control of HTTP request processing without also permitting unprivileged users to run Perl code in the context of the user account that runs Apache HTTP Server processes. |
Ubuntu USN |
USN-3825-1 | mod_perl vulnerability |
Ubuntu USN |
USN-3825-2 | mod_perl vulnerability |
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Subscriptions
Apache
Subscribe
Mod Perl
Subscribe
Canonical
Subscribe
Ubuntu Linux
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Desktop
Subscribe
Enterprise Linux Server
Subscribe
Enterprise Linux Workstation
Subscribe
Rhel Software Collections
Subscribe
Status: PUBLISHED
Assigner: debian
Published:
Updated: 2024-08-06T23:15:30.814Z
Reserved: 2011-07-19T00:00:00.000Z
Link: CVE-2011-2767
No data.
Status : Modified
Published: 2018-08-26T16:29:00.230
Modified: 2024-11-21T01:28:55.943
Link: CVE-2011-2767
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN