Vulnerability   
Search   
    Search 211766 CVE descriptions
and 97459 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.117537
Category:Web application abuses
Title:Apache HTTP Server 'mod_perl' /perl-status accessible (HTTP)
Summary:Requesting the URI /perl-status provides a comprehensive; overview of the server configuration.
Description:Summary:
Requesting the URI /perl-status provides a comprehensive
overview of the server configuration.

Vulnerability Insight:
perl-status is a Apache HTTP Server handler provided by the
'mod_perl' module and used to retrieve the server's configuration.

Vulnerability Impact:
Requesting the URI /perl-status gives throughout information
about the currently running Apache to an attacker.

Affected Software/OS:
All Apache installations with an enabled 'mod_perl' module.

Solution:
- If this feature is unused commenting out the appropriate
section in the web servers configuration is recommended.

- If this feature is used restricting access to trusted clients is recommended.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2021 E-Soft Inc. All rights reserved.