PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial of service (resource consumption) via a crafted URI.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2007-03-30 00:19
Updated : 2022-02-03 16:26
NVD link : CVE-2007-1349
Mitre link : CVE-2007-1349
CVE.ORG link : CVE-2007-1349
JSON object : View
Products Affected
apache
- mod_perl
redhat
- enterprise_linux_server
- enterprise_linux_desktop
- enterprise_linux_eus
- enterprise_linux_workstation
- satellite
canonical
- ubuntu_linux
CWE
CWE-20
Improper Input Validation