CVE-2009-0796 – Apache mod_perl - 'Apache::Status' / 'Apache2::Status' Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2009-0796
Cross-site scripting (XSS) vulnerability in Status.pm in Apache::Status and Apache2::Status in mod_perl1 and mod_perl2 for the Apache HTTP Server, when /perl-status is accessible, allows remote attackers to inject arbitrary web script or HTML via the URI. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Status.pm en Apache::Status y Apache2::Status en mod_perl1 y mod_perl2 para Apache HTTP Server, cuando /perl-status esta accesible, permite a atacantes remotos inyectar código web o HTML de modo arbitrario a través de la URI. The perl-status utility as included with Mod_perl suffers from a cross site scripting vulnerability. • https://www.exploit-db.com/exploits/9993 http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html http://secunia.com/advisories/34597 http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021508.1-1 http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021709.1-1 http://support.apple.com/kb/HT4435 http://svn.apache.org/viewvc/perl/modperl/branches/1.x/lib/Apache/Status.pm?r1=177851&r2=761081&pathrev=761081&diff_format=h http://svn.apache.o • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2007-1349 – mod_perl PerlRun denial of service
https://notcve.org/view.php?id=CVE-2007-1349
PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial of service (resource consumption) via a crafted URI. PerlRun.pm en Apache mod_perl versiones anteriores a 1.30, y RegistryCooker.pm en mod_perl versiones 2.x, no escapa correctamente el PATH_INFO antes de usarlo en una expresión regular, lo que permite a atacantes remotos causar una denegación de servicio (consumo de recursos) por medio de un URI especialmente diseñado. • ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc http://rhn.redhat.com/errata/RHSA-2007-0395.html http://rhn.redhat.com/errata/RHSA-2008-0630.html http://secunia.com/advisories/24678 http://secunia.com/advisories/24839 http://secunia.com/advisories/25072 http://secunia.com/advisories/25110 http://secunia.com/advisories/25432 http://secunia.com/advisories/25655 http://secunia.com/advisories/25730 http://secunia.com/advisories/25894 http://secun • CWE-20: Improper Input Validation •