Arbitrary Code Execution Vulnerability in mod_perl by Apache
CVE-2011-2767
9.8CRITICAL
Summary
The vulnerability in mod_perl affects versions 2.0 through 2.0.10, enabling attackers to execute arbitrary Perl code through user-owned .htaccess files. This occurs due to a lack of configuration options that would restrict Perl code execution, thus allowing unprivileged users the ability to run code in the context of the Apache HTTP Server processes. The oversight in the documentation signifies a significant security gap that could compromise server integrity and expose sensitive data.
Affected Version(s)
mod_perl 2.0 through 2.0.10 mod_perl 2.0 through 2.0.10
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved