Solved

.htaccess - Allow cgi scripts without extensions to run

Posted on 2009-05-07
2
574 Views
Last Modified: 2012-05-06
I have a bunch of old Perl web scripts that do NOT have an extension.  Even though the permissions are set to 755 the code is outputted instead of the script running.

Could this be fixed with .htaccess? If so, what should I place in .htaccess?
0
Comment
Question by:hankknight
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 51

Assisted Solution

by:ahoffmann
ahoffmann earned 200 total points
ID: 24333599
# assuming your files in /cgi-bin/


 Options +ExecCGI
  ...

0
 
LVL 27

Accepted Solution

by:
caterham_www earned 300 total points
ID: 24334159
> Could this be fixed with .htaccess? If so, what should I place in .htaccess?

To pass any resource to mod_cgi,

SetHandler cgi-script
0

Featured Post

Portable, direct connect server access

The ATEN CV211 connects a laptop directly to any server allowing you instant access to perform data maintenance and local operations, for quick troubleshooting, updating, service and repair.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
XAMPP 3 80
Why Xampp showing MySQL as Maria DB on Welcome Page ? 8 131
More Than One Website On Same DMZ Server 3 102
activeMQ Queue Messages Enqueued and Messages Dequeued 1 115
As Wikipedia explains 'robots.txt' as -- the robot exclusion standard, also known as the Robots Exclusion Protocol or robots.txt protocol, is a convention to prevent cooperating web spiders and other web robots from accessing all or part of a websit…
If you are a web developer, you would be aware of the <iframe> tag in HTML. The <iframe> stands for inline frame and is used to embed another document within the current HTML document. The embedded document could be even another website.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question