Vulnerability Details : CVE-2009-0796
Cross-site scripting (XSS) vulnerability in Status.pm in Apache::Status and Apache2::Status in mod_perl1 and mod_perl2 for the Apache HTTP Server, when /perl-status is accessible, allows remote attackers to inject arbitrary web script or HTML via the URI.
Vulnerability category: Cross site scripting (XSS)
Exploit prediction scoring system (EPSS) score for CVE-2009-0796
Probability of exploitation activity in the next 30 days: 0.97%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 82 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2009-0796
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
2.6
|
LOW | AV:N/AC:H/Au:N/C:N/I:P/A:N |
4.9
|
2.9
|
NIST |
CWE ids for CVE-2009-0796
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2009-0796
-
Red Hat 2009-06-11Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2009-0796 The Red Hat Security Response Team has rated this issue as having moderate security impact, a future mod_perl package update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/
- http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021508.1-1
-
https://bugzilla.redhat.com/show_bug.cgi?id=494402
-
http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
Apple - Lists.apple.com
-
http://www.securitytracker.com/id?1021988
-
http://www.gossamer-threads.com/lists/modperl/modperl/99475#99475
Exploit
-
http://www.vupen.com/english/advisories/2009/0943
-
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021709.1-1
-
http://support.apple.com/kb/HT4435
We're sorry.
-
http://www.securityfocus.com/archive/1/502709/100/0/threaded
-
http://www.gossamer-threads.com/lists/modperl/modperl-cvs/99477#99477
Exploit
-
https://launchpad.net/bugs/cve/2009-0796
-
http://www.mandriva.com/security/advisories?name=MDVSA-2009:091
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8488
-
http://svn.apache.org/viewvc?view=rev&revision=761081
Patch;Vendor Advisory
-
http://svn.apache.org/viewvc/perl/modperl/branches/1.x/lib/Apache/Status.pm?r1=177851&r2=761081&pathrev=761081&diff_format=h
-
http://www.securityfocus.com/bid/34383
- cpe:2.3:a:apache:mod_perl:2:*:*:*:*:*:*:*When used together with: Apache » Http Server
- cpe:2.3:a:apache:mod_perl:1:*:*:*:*:*:*:*When used together with: Apache » Http Server