Описание
mod_perl 2.0 through 2.0.10 allows attackers to execute arbitrary Perl code by placing it in a user-owned .htaccess file, because (contrary to the documentation) there is no configuration option that permits Perl code for the administrator's control of HTTP request processing without also permitting unprivileged users to run Perl code in the context of the user account that runs Apache HTTP Server processes.
Отчет
The default configurations shipped in Red Hat Enterprise Linux 6 and Red Hat Software Collections are not vulnerable to to this flaw. The UserDir option needs to be enabled as well as AllowOverride being set to values other than "None" for this to potentially pose a threat.
Меры по смягчению последствий
Disabling the UserDir directive and also setting AllowOverride None should prevent the processing of perl in user .htaccess files.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 5 | mod_perl | Will not fix | ||
| Red Hat Enterprise Linux 8 | mod_perl | Not affected | ||
| Red Hat Enterprise Linux 6 | mod_perl | Fixed | RHSA-2018:2737 | 24.09.2018 |
| Red Hat Software Collections for Red Hat Enterprise Linux 6 | rh-perl524-mod_perl | Fixed | RHSA-2018:2826 | 27.09.2018 |
| Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS | rh-perl524-mod_perl | Fixed | RHSA-2018:2826 | 27.09.2018 |
| Red Hat Software Collections for Red Hat Enterprise Linux 7 | rh-perl526-mod_perl | Fixed | RHSA-2018:2825 | 27.09.2018 |
| Red Hat Software Collections for Red Hat Enterprise Linux 7 | rh-perl524-mod_perl | Fixed | RHSA-2018:2826 | 27.09.2018 |
| Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS | rh-perl526-mod_perl | Fixed | RHSA-2018:2825 | 27.09.2018 |
| Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS | rh-perl524-mod_perl | Fixed | RHSA-2018:2826 | 27.09.2018 |
| Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS | rh-perl526-mod_perl | Fixed | RHSA-2018:2825 | 27.09.2018 |
Показывать по
Дополнительная информация
Статус:
6.3 Medium
CVSS3
Связанные уязвимости
mod_perl 2.0 through 2.0.10 allows attackers to execute arbitrary Perl code by placing it in a user-owned .htaccess file, because (contrary to the documentation) there is no configuration option that permits Perl code for the administrator's control of HTTP request processing without also permitting unprivileged users to run Perl code in the context of the user account that runs Apache HTTP Server processes.
mod_perl 2.0 through 2.0.10 allows attackers to execute arbitrary Perl code by placing it in a user-owned .htaccess file, because (contrary to the documentation) there is no configuration option that permits Perl code for the administrator's control of HTTP request processing without also permitting unprivileged users to run Perl code in the context of the user account that runs Apache HTTP Server processes.
mod_perl 2.0 through 2.0.10 allows attackers to execute arbitrary Perl ...
6.3 Medium
CVSS3