CVE-2011-2766

The FCGI (aka Fast CGI) module 0.70 through 0.73 for Perl, as used by CGI::Fast, uses environment variable values from one request during processing of a later request, which allows remote attackers to bypass authentication via crafted HTTP headers.
References
Link Resource
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607479 Exploit Issue Tracking Mailing List Third Party Advisory
http://www.debian.org/security/2011/dsa-2327 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2012:001 Third Party Advisory
http://www.openwall.com/lists/oss-security/2011/09/08/1 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2011/09/08/2 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/49549 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=736604 Exploit Issue Tracking Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/69709 Third Party Advisory VDB Entry
https://hermes.opensuse.org/messages/13154637 Broken Link
https://hermes.opensuse.org/messages/13155253 Broken Link
https://rt.cpan.org/Public/Bug/Display.html?id=68380 Exploit Patch Third Party Advisory
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607479 Exploit Issue Tracking Mailing List Third Party Advisory
http://www.debian.org/security/2011/dsa-2327 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2012:001 Third Party Advisory
http://www.openwall.com/lists/oss-security/2011/09/08/1 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2011/09/08/2 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/49549 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=736604 Exploit Issue Tracking Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/69709 Third Party Advisory VDB Entry
https://hermes.opensuse.org/messages/13154637 Broken Link
https://hermes.opensuse.org/messages/13155253 Broken Link
https://rt.cpan.org/Public/Bug/Display.html?id=68380 Exploit Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:fast_cgi_project:fast_cgi:*:*:*:*:*:perl:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:28

Type Values Removed Values Added
References () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607479 - Exploit, Issue Tracking, Mailing List, Third Party Advisory () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607479 - Exploit, Issue Tracking, Mailing List, Third Party Advisory
References () http://www.debian.org/security/2011/dsa-2327 - Third Party Advisory () http://www.debian.org/security/2011/dsa-2327 - Third Party Advisory
References () http://www.mandriva.com/security/advisories?name=MDVSA-2012:001 - Third Party Advisory () http://www.mandriva.com/security/advisories?name=MDVSA-2012:001 - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2011/09/08/1 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2011/09/08/1 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2011/09/08/2 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2011/09/08/2 - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/49549 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/49549 - Third Party Advisory, VDB Entry
References () https://bugzilla.redhat.com/show_bug.cgi?id=736604 - Exploit, Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=736604 - Exploit, Issue Tracking, Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/69709 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/69709 - Third Party Advisory, VDB Entry
References () https://hermes.opensuse.org/messages/13154637 - Broken Link () https://hermes.opensuse.org/messages/13154637 - Broken Link
References () https://hermes.opensuse.org/messages/13155253 - Broken Link () https://hermes.opensuse.org/messages/13155253 - Broken Link
References () https://rt.cpan.org/Public/Bug/Display.html?id=68380 - Exploit, Patch, Third Party Advisory () https://rt.cpan.org/Public/Bug/Display.html?id=68380 - Exploit, Patch, Third Party Advisory

Information

Published : 2011-09-23 10:55

Updated : 2024-11-21 01:28


NVD link : CVE-2011-2766

Mitre link : CVE-2011-2766

CVE.ORG link : CVE-2011-2766


JSON object : View

Products Affected

fast_cgi_project

  • fast_cgi

debian

  • debian_linux
CWE
CWE-287

Improper Authentication