First published: Tue Aug 28 2018(Updated: )
A flaw was found in mod_perl 2.0 through 2.0.10 which allows attackers to execute arbitrary Perl code by placing it in a user-owned .htaccess file, because (contrary to the documentation) there is no configuration option that permits Perl code for the administrator's control of HTTP request processing without also permitting unprivileged users to run Perl code in the context of the user account that runs Apache HTTP Server processes. References: <a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=644169">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=644169</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Apache mod_perl | >=2.0<=2.0.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1623265 is considered high due to the potential for arbitrary code execution.
To fix REDHAT-BUG-1623265, upgrade mod_perl to version 2.0.11 or later where the flaw is addressed.
The affected versions of mod_perl are from 2.0 to 2.0.10 inclusive.
The impact of REDHAT-BUG-1623265 is that attackers can execute arbitrary Perl code via user-owned .htaccess files.
Mod_perl is an Apache module that embeds a Perl interpreter into the server, which is vulnerable as described in REDHAT-BUG-1623265.