CVE-2009-0796
Apache mod_perl - 'Apache::Status' / 'Apache2::Status' Cross-Site Scripting
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
4Exploited in Wild
-Decision
Descriptions
Cross-site scripting (XSS) vulnerability in Status.pm in Apache::Status and Apache2::Status in mod_perl1 and mod_perl2 for the Apache HTTP Server, when /perl-status is accessible, allows remote attackers to inject arbitrary web script or HTML via the URI.
Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Status.pm en Apache::Status y Apache2::Status en mod_perl1 y mod_perl2 para Apache HTTP Server, cuando /perl-status esta accesible, permite a atacantes remotos inyectar código web o HTML de modo arbitrario a través de la URI.
Cross-site scripting (XSS) vulnerability in Status.pm in Apache::Status and Apache2::Status in mod_perl1 and mod_perl2 for the Apache HTTP Server, when /perl-status is accessible, allows remote attackers to inject arbitrary web script or HTML via the URI. The updated packages have been patched to correct these issues. Packages for 2008.0 are being provided due to extended support for Corporate products.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2009-03-04 CVE Reserved
- 2009-04-07 CVE Published
- 2009-04-15 First Exploit
- 2024-08-07 CVE Updated
- 2025-04-23 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (19)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/34597 | Third Party Advisory | |
http://support.apple.com/kb/HT4435 | X_refsource_confirm |
|
http://svn.apache.org/viewvc/perl/modperl/branches/1.x/lib/Apache/Status.pm?r1=177851&r2=761081&pathrev=761081&diff_format=h | X_refsource_confirm | |
http://www.securityfocus.com/archive/1/502709/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/34383 | Vdb Entry | |
http://www.securitytracker.com/id?1021988 | Vdb Entry | |
http://www.vupen.com/english/advisories/2009/0943 | Vdb Entry | |
https://bugzilla.redhat.com/show_bug.cgi?id=494402 | X_refsource_confirm | |
https://launchpad.net/bugs/cve/2009-0796 | X_refsource_misc | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8488 | Signature |
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/76693 | 2009-04-15 | |
https://www.exploit-db.com/exploits/9993 | 2017-01-31 | |
http://www.gossamer-threads.com/lists/modperl/modperl-cvs/99477#99477 | 2024-08-07 | |
http://www.gossamer-threads.com/lists/modperl/modperl/99475#99475 | 2024-08-07 |
URL | Date | SRC |
---|---|---|
http://svn.apache.org/viewvc?view=rev&revision=761081 | 2023-02-13 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Apache Search vendor "Apache" | Mod Perl Search vendor "Apache" for product "Mod Perl" | 1 Search vendor "Apache" for product "Mod Perl" and version "1" | - |
Affected
| in | Apache Search vendor "Apache" | Http Server Search vendor "Apache" for product "Http Server" | * | - |
Safe
|
Apache Search vendor "Apache" | Mod Perl Search vendor "Apache" for product "Mod Perl" | 2 Search vendor "Apache" for product "Mod Perl" and version "2" | - |
Affected
| in | Apache Search vendor "Apache" | Http Server Search vendor "Apache" for product "Http Server" | * | - |
Safe
|