CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
AI Score
Confidence
Low
EPSS
Percentile
85.8%
The mod_security2 module before 2.7.0 for the Apache HTTP Server allows remote attackers to bypass rules, and deliver arbitrary POST data to a PHP application, via a multipart request in which an invalid part precedes the crafted data.
Vendor | Product | Version | CPE |
---|---|---|---|
trustwave | modsecurity | * | cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:* |
opensuse | opensuse | 11.4 | cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:* |
opensuse | opensuse | 12.2 | cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:* |
opensuse | opensuse | 12.3 | cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:* |
fedoraproject | fedora | 18 | cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:* |
lists.fedoraproject.org/pipermail/package-announce/2012-November/093011.html
lists.opensuse.org/opensuse-updates/2013-08/msg00020.html
lists.opensuse.org/opensuse-updates/2013-08/msg00025.html
lists.opensuse.org/opensuse-updates/2013-08/msg00031.html
mod-security.svn.sourceforge.net/viewvc/mod-security/m2/branches/2.7.x/CHANGES
mod-security.svn.sourceforge.net/viewvc/mod-security/m2/trunk/apache2/msc_multipart.c?sortby=date&r1=2081&r2=2080&pathrev=2081
mod-security.svn.sourceforge.net/viewvc/mod-security?view=revision&sortby=date&revision=2081
seclists.org/fulldisclosure/2012/Oct/113
www.openwall.com/lists/oss-security/2012/10/18/14
www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20121017-0_mod_security_ruleset_bypass.txt