CVE-2011-2767

Source
https://nvd.nist.gov/vuln/detail/CVE-2011-2767
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2011-2767.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2011-2767
Related
Published
2018-08-26T16:29:00Z
Modified
2024-09-11T02:00:06Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

mod_perl 2.0 through 2.0.10 allows attackers to execute arbitrary Perl code by placing it in a user-owned .htaccess file, because (contrary to the documentation) there is no configuration option that permits Perl code for the administrator's control of HTTP request processing without also permitting unprivileged users to run Perl code in the context of the user account that runs Apache HTTP Server processes.

References

Affected packages

Debian:11 / libapache2-mod-perl2

Package

Name
libapache2-mod-perl2
Purl
pkg:deb/debian/libapache2-mod-perl2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.10-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / libapache2-mod-perl2

Package

Name
libapache2-mod-perl2
Purl
pkg:deb/debian/libapache2-mod-perl2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.10-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / libapache2-mod-perl2

Package

Name
libapache2-mod-perl2
Purl
pkg:deb/debian/libapache2-mod-perl2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.10-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}