{"id":"CVE-2009-0796","details":"Cross-site scripting (XSS) vulnerability in Status.pm in Apache::Status and Apache2::Status in mod_perl1 and mod_perl2 for the Apache HTTP Server, when /perl-status is accessible, allows remote attackers to inject arbitrary web script or HTML via the URI.","modified":"2026-04-10T03:40:39.126734Z","published":"2009-04-07T23:30:00Z","references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/34597"},{"type":"ADVISORY","url":"http://svn.apache.org/viewvc?view=rev&revision=761081"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:091"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2009/0943"},{"type":"EVIDENCE","url":"http://www.gossamer-threads.com/lists/modperl/modperl-cvs/99477#99477"},{"type":"EVIDENCE","url":"http://www.gossamer-threads.com/lists/modperl/modperl/99475#99475"},{"type":"FIX","url":"http://svn.apache.org/viewvc?view=rev&revision=761081"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=494402"},{"type":"WEB","url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"},{"type":"WEB","url":"http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021508.1-1"},{"type":"WEB","url":"http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021709.1-1"},{"type":"WEB","url":"http://support.apple.com/kb/HT4435"},{"type":"WEB","url":"http://svn.apache.org/viewvc/perl/modperl/branches/1.x/lib/Apache/Status.pm?r1=177851&r2=761081&pathrev=761081&diff_format=h"},{"type":"WEB","url":"http://www.securityfocus.com/archive/1/502709/100/0/threaded"},{"type":"WEB","url":"http://www.securityfocus.com/bid/34383"},{"type":"WEB","url":"http://www.securitytracker.com/id?1021988"},{"type":"WEB","url":"https://launchpad.net/bugs/cve/2009-0796"},{"type":"WEB","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8488"}],"schema_version":"1.7.5"}