National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2009-0796 Detail

Description

Cross-site scripting (XSS) vulnerability in Status.pm in Apache::Status and Apache2::Status in mod_perl1 and mod_perl2 for the Apache HTTP Server, when /perl-status is accessible, allows remote attackers to inject arbitrary web script or HTML via the URI.

Source:  MITRE      Last Modified:  04/07/2009

Quick Info

CVE Dictionary Entry:
CVE-2009-0796
Original release date:
04/07/2009
Last revised:
09/28/2017
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
2.6 LOW
Vector:
(AV:N/AC:H/Au:N/C:N/I:P/A:N) (legend)
Impact Subscore:
2.9
Exploitability Subscore:
4.9
CVSS Version 2 Metrics:
Access Vector:
Network exploitable - Victim must voluntarily interact with attack mechanism
Access Complexity:
High
Authentication:
Not required to exploit
Impact Type:
Allows unauthorized modification

Vendor Statements (disclaimer)

Official Statement from Red Hat (06/11/2009)

Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2009-0796 The Red Hat Security Response Team has rated this issue as having moderate security impact, a future mod_perl package update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html External Source APPLE APPLE-SA-2010-11-10-1
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021508.1-1 External Source SUNALERT 1021508
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021709.1-1 External Source SUNALERT 1021709
http://support.apple.com/kb/HT4435 External Source CONFIRM http://support.apple.com/kb/HT4435
http://svn.apache.org/viewvc/perl/modperl/branches/1.x/lib/Apache/Status.pm?r1=177851&r2=761081&pathrev=761081&diff_format=h External Source CONFIRM http://svn.apache.org/viewvc/perl/modperl/branches/1.x/lib/Apache/Status.pm?r1=177851&r2=761081&pathrev=761081&diff_format=h
http://svn.apache.org/viewvc?view=rev&revision=761081 Patch; Vendor Advisory External Source CONFIRM http://svn.apache.org/viewvc?view=rev&revision=761081
http://www.gossamer-threads.com/lists/modperl/modperl/99475#99475 Exploit External Source MLIST [modperl] 20090401 [SECURITY] [CVE-2009-0796] Vulnerability found in Apache::Status and Apache2::Status
http://www.gossamer-threads.com/lists/modperl/modperl-cvs/99477#99477 Exploit External Source MLIST [modperl-cvs] 20090401 svn commit: r761081 - in /perl/modperl/branches/1.x: Changes lib/Apache/Status.pm
http://www.mandriva.com/security/advisories?name=MDVSA-2009:091 External Source MANDRIVA MDVSA-2009:091
http://www.securityfocus.com/archive/1/archive/1/502709/100/0/threaded External Source BUGTRAQ 20090415 XSS with mod_perl perl_status utility
http://www.securityfocus.com/bid/34383 External Source BID 34383
http://www.securitytracker.com/id?1021988 External Source SECTRACK 1021988
http://www.vupen.com/english/advisories/2009/0943 External Source VUPEN ADV-2009-0943
https://bugzilla.redhat.com/show_bug.cgi?id=494402 External Source CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=494402
https://launchpad.net/bugs/cve/2009-0796 External Source MISC https://launchpad.net/bugs/cve/2009-0796
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8488 External Source OVAL oval:org.mitre.oval:def:8488

References to Check Content

Identifier:
oval:org.mitre.oval:def:8488
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:8488

Technical Details

Vulnerability Type (View All)

  • Cross-Site Scripting (XSS) (CWE-79)

Change History 3 change records found - show changes