Vulnerability Details : CVE-2011-2766
The FCGI (aka Fast CGI) module 0.70 through 0.73 for Perl, as used by CGI::Fast, uses environment variable values from one request during processing of a later request, which allows remote attackers to bypass authentication via crafted HTTP headers.
Vulnerability category: BypassGain privilege
Exploit prediction scoring system (EPSS) score for CVE-2011-2766
Probability of exploitation activity in the next 30 days: 0.23%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 60 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2011-2766
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2011-2766
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-2766
-
http://www.mandriva.com/security/advisories?name=MDVSA-2012:001
mandriva.comThird Party Advisory
-
http://www.openwall.com/lists/oss-security/2011/09/08/1
oss-security - CVE Request -- libfcgi-perl / perl-FCGI: Certain environment variables shared between first and subsequent HTTP requestsMailing List;Third Party Advisory
-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607479
#607479 - libfcgi-perl: [CVE-2011-2766] After reloading some environment vars become constants, that will be used if not overruled by the headers of new requests. - Debian Bug report logsExploit;Issue Tracking;Mailing List;Third Party Advisory
-
https://hermes.opensuse.org/messages/13155253
openSUSE.org - 503Broken Link
-
http://www.debian.org/security/2011/dsa-2327
Debian -- Security Information -- DSA-2327-1 libfcgi-perlThird Party Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/69709
Perl Fast CGI module security bypass CVE-2011-2766 Vulnerability ReportThird Party Advisory;VDB Entry
-
http://www.securityfocus.com/bid/49549
Perl Fast CGI Module CGI Variables Authentication Security Bypass VulnerabilityThird Party Advisory;VDB Entry
-
https://hermes.opensuse.org/messages/13154637
openSUSE.org - 503Broken Link
-
https://rt.cpan.org/Public/Bug/Display.html?id=68380
Bug #68380 for FCGI: FCGI-0.70 to 0.72 with perl5.12: CGI.pm receives CGI variables from previous requestsExploit;Patch;Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=736604
736604 – (CVE-2011-2766) CVE-2011-2766 perl-FCGI, fcgi: Certain environment variables shared between first and subsequent HTTP requestsExploit;Issue Tracking;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2011/09/08/2
oss-security - Re: CVE Request -- libfcgi-perl / perl-FCGI: Certain environment variables shared between first and subsequent HTTP requestsMailing List;Third Party Advisory
Products affected by CVE-2011-2766
- cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
- Fast Cgi Project » Fast Cgi » For PerlVersions from including (>=) 0.70 and up to, including, (<=) 0.73cpe:2.3:a:fast_cgi_project:fast_cgi:*:*:*:*:*:perl:*:*