Lucene search

K
ubuntucveUbuntu.comUB:CVE-2011-2767
HistoryAug 26, 2018 - 12:00 a.m.

CVE-2011-2767

2018-08-2600:00:00
ubuntu.com
ubuntu.com
10

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.008 Low

EPSS

Percentile

81.0%

mod_perl 2.0 through 2.0.10 allows attackers to execute arbitrary Perl code
by placing it in a user-owned .htaccess file, because (contrary to the
documentation) there is no configuration option that permits Perl code for
the administrator’s control of HTTP request processing without also
permitting unprivileged users to run Perl code in the context of the user
account that runs Apache HTTP Server processes.

Bugs

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchlibapache2-mod-perl2< 2.0.10-2ubuntu3.18.04.1UNKNOWN
ubuntu18.10noarchlibapache2-mod-perl2< 2.0.10-2ubuntu3.18.10.1UNKNOWN
ubuntu14.04noarchlibapache2-mod-perl2< 2.0.8+httpd24-r1449661-6ubuntu2.1UNKNOWN
ubuntu16.04noarchlibapache2-mod-perl2< 2.0.9-4ubuntu1.2UNKNOWN

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.008 Low

EPSS

Percentile

81.0%