Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2011-2767

Опубликовано: 03 окт. 2011
Источник: redhat
CVSS3: 6.3

Описание

mod_perl 2.0 through 2.0.10 allows attackers to execute arbitrary Perl code by placing it in a user-owned .htaccess file, because (contrary to the documentation) there is no configuration option that permits Perl code for the administrator's control of HTTP request processing without also permitting unprivileged users to run Perl code in the context of the user account that runs Apache HTTP Server processes.

Отчет

The default configurations shipped in Red Hat Enterprise Linux 6 and Red Hat Software Collections are not vulnerable to to this flaw. The UserDir option needs to be enabled as well as AllowOverride being set to values other than "None" for this to potentially pose a threat.

Меры по смягчению последствий

Disabling the UserDir directive and also setting AllowOverride None should prevent the processing of perl in user .htaccess files.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5mod_perlWill not fix
Red Hat Enterprise Linux 8mod_perlNot affected
Red Hat Enterprise Linux 6mod_perlFixedRHSA-2018:273724.09.2018
Red Hat Software Collections for Red Hat Enterprise Linux 6rh-perl524-mod_perlFixedRHSA-2018:282627.09.2018
Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUSrh-perl524-mod_perlFixedRHSA-2018:282627.09.2018
Red Hat Software Collections for Red Hat Enterprise Linux 7rh-perl526-mod_perlFixedRHSA-2018:282527.09.2018
Red Hat Software Collections for Red Hat Enterprise Linux 7rh-perl524-mod_perlFixedRHSA-2018:282627.09.2018
Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUSrh-perl526-mod_perlFixedRHSA-2018:282527.09.2018
Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUSrh-perl524-mod_perlFixedRHSA-2018:282627.09.2018
Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUSrh-perl526-mod_perlFixedRHSA-2018:282527.09.2018

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-266
https://bugzilla.redhat.com/show_bug.cgi?id=1623265mod_perl: arbitrary Perl code execution in the context of the user account via a user-owned .htaccess

6.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 7 лет назад

mod_perl 2.0 through 2.0.10 allows attackers to execute arbitrary Perl code by placing it in a user-owned .htaccess file, because (contrary to the documentation) there is no configuration option that permits Perl code for the administrator's control of HTTP request processing without also permitting unprivileged users to run Perl code in the context of the user account that runs Apache HTTP Server processes.

CVSS3: 9.8
nvd
около 7 лет назад

mod_perl 2.0 through 2.0.10 allows attackers to execute arbitrary Perl code by placing it in a user-owned .htaccess file, because (contrary to the documentation) there is no configuration option that permits Perl code for the administrator's control of HTTP request processing without also permitting unprivileged users to run Perl code in the context of the user account that runs Apache HTTP Server processes.

CVSS3: 9.8
debian
около 7 лет назад

mod_perl 2.0 through 2.0.10 allows attackers to execute arbitrary Perl ...

suse-cvrf
почти 6 лет назад

Security update for apache2-mod_perl

suse-cvrf
почти 6 лет назад

Security update for apache2-mod_perl

6.3 Medium

CVSS3