PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial of service (resource consumption) via a crafted URI.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
03 Feb 2022, 16:26
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:redhat:satellite:5.1:*:*:*:*:*:*:* |
Information
Published : 2007-03-30 00:19
Updated : 2024-02-04 17:13
NVD link : CVE-2007-1349
Mitre link : CVE-2007-1349
CVE.ORG link : CVE-2007-1349
JSON object : View
Products Affected
redhat
- enterprise_linux_server
- satellite
- enterprise_linux_workstation
- enterprise_linux_eus
- enterprise_linux_desktop
apache
- mod_perl
canonical
- ubuntu_linux
CWE
CWE-20
Improper Input Validation