mod_perl
Page content
- Author: voroskoi
- Vulnerable: 2.0.3-1
- Unaffected: 2.0.3-2terminus1
A vulnerability has been reported in mod_perl, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to a regular expression in “RegistryCooker.pm” (mod_perl 2.x) or “PerlRun.pm” (mod_perl 1.x) that uses the “path_info” variable without properly escaping it. This can be exploited to cause a DoS by sending requests with specially crafted URLs to a vulnerable server.
- Bug Tracker URL: http://bugs.frugalware.org/task/1894