mod_perl

Page content
  • Author: voroskoi
  • Vulnerable: 2.0.3-1
  • Unaffected: 2.0.3-2terminus1

A vulnerability has been reported in mod_perl, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to a regular expression in “RegistryCooker.pm” (mod_perl 2.x) or “PerlRun.pm” (mod_perl 1.x) that uses the “path_info” variable without properly escaping it. This can be exploited to cause a DoS by sending requests with specially crafted URLs to a vulnerable server.

CVEs: