Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2012-2751
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
ModSecurity before 2.6.6, when used with PHP, does not properly handle single quotes not at the beginning of a request parameter value in the Content-Disposition field of a request with a multipart/form-data Content-Type header, which allows remote attackers to bypass filtering rules and perform other attacks such as cross-site scripting (XSS) attacks. NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-5031..
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 4.3/10
- Exploit Score
- 8.6/10
- Access Vector
- Network
- Access Complexity
- Medium
- Authentication Required
- None
- Impact Score
- 2.9/10
- Confidentiality Impact
- None
- Availability Impact
- None
- Integrity Impact
- Partial
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:* |
Yes
|
- | 2.6.6 | |
cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:http_server:11.1.1.6.0:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/trunk/CHANGES?r1=1920&r2=
- http://www.securityfocus.com/bid/54156
- http://secunia.com/advisories/49576
- http://blog.ivanristic.com/2012/06/modsecurity-and-modsecurity-core-rule-set-multipart-b
- http://www.openwall.com/lists/oss-security/2012/06/22/2
- http://www.debian.org/security/2012/dsa-2506
- http://secunia.com/advisories/49782
- http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/trunk/apache2/msc_multipa
- http://www.openwall.com/lists/oss-security/2012/06/22/1
- http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/branches/2.6.x/CHANGES
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:118
- http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html
- http://lists.opensuse.org/opensuse-updates/2013-08/msg00020.html
- http://lists.opensuse.org/opensuse-updates/2013-08/msg00025.html
- http://lists.opensuse.org/opensuse-updates/2013-08/msg00031.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:150