Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2011-2767
Description:mod_perl 2.0 through 2.0.10 allows attackers to execute arbitrary Perl code by placing it in a user-owned .htaccess file, because (contrary to the documentation) there is no configuration option that permits Perl code for the administrator's control of HTTP request processing without also permitting unprivileged users to run Perl code in the context of the user account that runs Apache HTTP Server processes.
Test IDs: 1.3.6.1.4.1.25623.1.0.852785   1.3.6.1.4.1.25623.1.0.875042   1.3.6.1.4.1.25623.1.1.12.2018.3825.2   1.3.6.1.4.1.25623.1.1.4.2020.14266.1   1.3.6.1.4.1.25623.1.0.843828   1.3.6.1.4.1.25623.1.0.875046   1.3.6.1.4.1.25623.1.1.4.2019.3213.1   1.3.6.1.4.1.25623.1.0.882952   1.3.6.1.4.1.25623.1.0.891507   1.3.6.1.4.1.25623.1.1.10.2018.0474  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2011-2767
BugTraq ID: 105195
http://www.securityfocus.com/bid/105195
https://bugs.debian.org/644169
https://mail-archives.apache.org/mod_mbox/perl-modperl/201110.mbox/raw/%3C20111004084343.GA21290%40ktnx.net%3E
https://lists.debian.org/debian-lts-announce/2018/09/msg00018.html
https://lists.apache.org/thread.html/c8ebe8aad147a3ad2e7b0e8b2da45263171ab5d0fc7f8c100feaa94d@%3Cmodperl-cvs.perl.apache.org%3E
RedHat Security Advisories: RHSA-2018:2737
https://access.redhat.com/errata/RHSA-2018:2737
RedHat Security Advisories: RHSA-2018:2825
https://access.redhat.com/errata/RHSA-2018:2825
RedHat Security Advisories: RHSA-2018:2826
https://access.redhat.com/errata/RHSA-2018:2826
SuSE Security Announcement: openSUSE-SU-2019:2549 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00063.html
SuSE Security Announcement: openSUSE-SU-2019:2558 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00065.html
https://usn.ubuntu.com/3825-1/
https://usn.ubuntu.com/3825-2/




© 1998-2025 E-Soft Inc. All rights reserved.