CVE-2007-1349

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2007-1349
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2007-1349.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2007-1349
Related
Published
2007-03-30T00:19:00Z
Modified
2024-06-30T12:01:22Z
Summary
[none]
Details

PerlRun.pm in Apache modperl before 1.30, and RegistryCooker.pm in modperl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial of service (resource consumption) via a crafted URI.

References

Affected packages

Debian:11 / libapache2-mod-perl2

Package

Name
libapache2-mod-perl2
Purl
pkg:deb/debian/libapache2-mod-perl2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.2-5

Ecosystem specific

{
    "urgency": "low"
}

Debian:12 / libapache2-mod-perl2

Package

Name
libapache2-mod-perl2
Purl
pkg:deb/debian/libapache2-mod-perl2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.2-5

Ecosystem specific

{
    "urgency": "low"
}

Debian:13 / libapache2-mod-perl2

Package

Name
libapache2-mod-perl2
Purl
pkg:deb/debian/libapache2-mod-perl2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.2-5

Ecosystem specific

{
    "urgency": "low"
}