First published: Wed Apr 01 2009(Updated: )
A flaw was found in the httpd mod_perl Apache::Status module. If a site has the non default setting of making /perl-status page accessible, remote attackers could use that flaw to trick users or steal sensitive browser data. The original public announcement can be found here: <a href="http://marc.info/?l=apache-modperl&m=123862312808765&w=2">http://marc.info/?l=apache-modperl&m=123862312808765&w=2</a> The CVE id mentioned in the above mail is wrong, <a href="https://access.redhat.com/security/cve/CVE-2009-0796">CVE-2009-0796</a> is the proper CVE id.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache mod_perl | =1 | |
Apache mod_perl | =2 | |
Apache Http Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0796 is classified as a moderate severity vulnerability impacting the Apache mod_perl module.
To fix CVE-2009-0796, remove or restrict access to the /perl-status page in your configuration.
CVE-2009-0796 affects Apache mod_perl versions 1 and 2.
CVE-2009-0796 allows remote attackers to trick users or steal sensitive browser data.
There is no specific patch for CVE-2009-0796, but mitigating the exposure of the vulnerable feature is recommended.