First published: Sun Aug 26 2018(Updated: )
A flaw was found in mod_perl 2.0 through 2.0.10 which allows attackers to execute arbitrary Perl code by placing it in a user-owned .htaccess file, because (contrary to the documentation) there is no configuration option that permits Perl code for the administrator's control of HTTP request processing without also permitting unprivileged users to run Perl code in the context of the user account that runs Apache HTTP Server processes. References: <a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=644169">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=644169</a>
Credit: security@debian.org security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Mod Perl | >=2.0.0<=2.0.10 | |
Debian Debian Linux | =8.0 | |
Redhat Enterprise Linux | =7.4 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux | =6.7 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Workstation | =6.0 | |
Redhat Enterprise Linux | =7.3 | |
Redhat Enterprise Linux | =7.5 | |
Redhat Enterprise Linux | =7.6 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 | |
debian/libapache2-mod-perl2 | 2.0.11-4 2.0.12-1 2.0.13-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.