CVE-2009-0796

Apache mod_perl - Cross-Site Scripting via URI Parameter in Apache::Status

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2009-0796. PoCs published by Richard H. Brain.

AI-analyzed exploit summary The provided text describes a cross-site scripting (XSS) vulnerability in Apache's mod_perl module, where user-supplied data is insufficiently sanitized. The example URL demonstrates how an attacker could inject arbitrary script code into a victim's browser.

Description

Cross-site scripting (XSS) vulnerability in Status.pm in Apache::Status and Apache2::Status in mod_perl1 and mod_perl2 for the Apache HTTP Server, when /perl-status is accessible, allows remote attackers to inject arbitrary web script or HTML via the URI.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Richard H. Brain · textremotemultiple
https://www.exploit-db.com/exploits/9993

The provided text describes a cross-site scripting (XSS) vulnerability in Apache's mod_perl module, where user-supplied data is insufficiently sanitized. The example URL demonstrates how an attacker could inject arbitrary script code into a victim's browser.

Classification
Writeup 90%
Attack Type
Xss
Complexity
Trivial
Reliability
Reliable
Target: Apache mod_perl (version not specified)
No auth needed
Prerequisites: Access to a vulnerable Apache server with mod_perl enabled
MITRE ATT&CK
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (17)

Core 17
Core References
Vendor Advisory vendor-advisory x_refsource_mandriva
http://www.mandriva.com/security/advisories?name=MDVSA-2009:091
Vendor Advisory vendor-advisory x_refsource_sunalert
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021508.1-1
Vendor Advisory vendor-advisory x_refsource_sunalert
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021709.1-1
Vendor Advisory x_refsource_confirm
http://support.apple.com/kb/HT4435
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://www.securitytracker.com/id?1021988
Patch, Vendor Advisory x_refsource_confirm
http://svn.apache.org/viewvc?view=rev&revision=761081
Issue Tracking x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=494402
Mailing List vendor-advisory x_refsource_apple
http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2009/0943
Various Sources x_refsource_misc
https://launchpad.net/bugs/cve/2009-0796
Third Party Advisory, VDB Entry vdb-entry signature x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8488
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/34383
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/34597
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/502709/100/0/threaded

Scores

EPSS 0.6073
EPSS Percentile 98.3%

Details

CWE
CWE-79
Status published
Products (2)
apache/mod_perl 1
apache/mod_perl 2
Published Apr 07, 2009
Tracked Since Feb 18, 2026