vulnerability

Amazon Linux AMI: CVE-2011-2767: Security patch for mod_perl, mod24_perl (ALAS-2018-1085)

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
Aug 26, 2018
Added
Oct 5, 2018
Modified
Apr 16, 2020

Description

mod_perl 2.0 through 2.0.10 allows attackers to execute arbitrary Perl code by placing it in a user-owned .htaccess file, because (contrary to the documentation) there is no configuration option that permits Perl code for the administrator's control of HTTP request processing without also permitting unprivileged users to run Perl code in the context of the user account that runs Apache HTTP Server processes.

Solution(s)

amazon-linux-upgrade--mod24_perlamazon-linux-upgrade-mod_perl
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.