2.6
CVSSv2

CVE-2009-0796

Published: 07/04/2009 Updated: 13/02/2023
CVSS v2 Base Score: 2.6 | Impact Score: 2.9 | Exploitability Score: 4.9
VMScore: 265
Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N

Vulnerability Summary

Cross-site scripting (XSS) vulnerability in Status.pm in Apache::Status and Apache2::Status in mod_perl1 and mod_perl2 for the Apache HTTP Server, when /perl-status is accessible, allows remote malicious users to inject arbitrary web script or HTML via the URI.

Vulnerable Product Search on Vulmon Subscribe to Product

apache mod_perl 1

apache mod_perl 2

Vendor Advisories

Debian Bug report logs - #567635 XSS in Statuspm Package: libapache2-mod-perl2; Maintainer for libapache2-mod-perl2 is Debian Perl Group <pkg-perl-maintainers@listsaliothdebianorg>; Source for libapache2-mod-perl2 is src:libapache2-mod-perl2 (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> D ...

Exploits

source: wwwsecurityfocuscom/bid/34383/info The Apache 'mod_perl' module is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site This may al ...
The perl-status utility as included with Mod_perl suffers from a cross site scripting vulnerability ...