COMMAND

    Apache::ASP

SYSTEMS AFFECTED

    Apache::ASP prior to v1.95

PROBLEM

    Joshua Chamas found following.  Apache::ASP had a security hole in
    its ./site/eg/source.asp  distribution examples  file, allowing  a
    malicious hacker to  potentially write to  files in the  directory
    local to the source.asp example script.

    The next version of Apache::ASP v1.95 going to CPAN will not  have
    this  security  hole  in  its  example  ./site/eg/source.asp   The
    general CHANGES for this release is below.

    The original report  on a similar  perl open() bug  was at ZDNet's
    eWeek where a hacking contest  at openhack.com turned up a  bug on
    its minivend ecommerce software.  For minivend, see:

        http://oliver.efri.hr/~crv/security/bugs/Others/minivend.html

SOLUTION

    Until you  have the  latest examples,  it is  recommended deleting
    this  source.asp  file  from  any  public  web  server  that   has
    Apache::ASP installed on it. 1.95 fixed this.