Lucene search

K
amazonAmazonALAS-2018-1085
HistoryOct 03, 2018 - 2:54 a.m.

Important: mod_perl, mod24_perl

2018-10-0302:54:00
alas.aws.amazon.com
541

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.008 Low

EPSS

Percentile

81.0%

Issue Overview:

mod_perl allows attackers to execute arbitrary Perl code by placing it in a user-owned .htaccess file, because (contrary to the documentation) there is no configuration option that permits Perl code for the administrator’s control of HTTP request processing without also permitting unprivileged users to run Perl code in the context of the user account that runs Apache HTTP Server processes.(CVE-2011-2767)

Affected Packages:

mod_perl, mod24_perl

Issue Correction:
Run yum update mod_perl to update your system if you are running httpd (2.2).
Run yum update mod24_perl to update your system if you are running httpd24 (2.4).

New Packages:

i686:  
    mod24_perl-2.0.7-7.20.amzn1.i686  
    mod24_perl-devel-2.0.7-7.20.amzn1.i686  
    mod24_perl-debuginfo-2.0.7-7.20.amzn1.i686  
    mod_perl-debuginfo-2.0.7-7.28.amzn1.i686  
    mod_perl-devel-2.0.7-7.28.amzn1.i686  
    mod_perl-2.0.7-7.28.amzn1.i686  
  
src:  
    mod24_perl-2.0.7-7.20.amzn1.src  
    mod_perl-2.0.7-7.28.amzn1.src  
  
x86_64:  
    mod24_perl-devel-2.0.7-7.20.amzn1.x86_64  
    mod24_perl-2.0.7-7.20.amzn1.x86_64  
    mod24_perl-debuginfo-2.0.7-7.20.amzn1.x86_64  
    mod_perl-2.0.7-7.28.amzn1.x86_64  
    mod_perl-debuginfo-2.0.7-7.28.amzn1.x86_64  
    mod_perl-devel-2.0.7-7.28.amzn1.x86_64  

Additional References

Red Hat: CVE-2011-2767

Mitre: CVE-2011-2767

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.008 Low

EPSS

Percentile

81.0%