vulnerability

FreeBSD: VID-c360d057-ea8b-11e9-859b-b885849ded8e: mod_perl2 -- execute arbitrary Perl code

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
Oct 9, 2019
Added
Dec 10, 2025
Modified
Dec 10, 2025

Description

mod_perl2 2.0.11 fixes Arbitrary Perl code execution in the context of the user account via a user-owned .htaccess. mod_perl 2.0 through 2.0.10 allows attackers to execute arbitrary Perl code by placing it in a user-owned .htaccess file, because (contrary to the documentation) there is no configuration option that permits Perl code for the administrator's control of HTTP request processing without also permitting unprivileged users to run Perl code in the context of the user account that runs Apache HTTP Server processes.

Solution

freebsd-upgrade-package-ap24-mod_perl2

References

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.