ID CVE-2012-4528
Summary The mod_security2 module before 2.7.0 for the Apache HTTP Server allows remote attackers to bypass rules, and deliver arbitrary POST data to a PHP application, via a multipart request in which an invalid part precedes the crafted data.
References
Vulnerable Configurations
  • cpe:2.3:a:trustwave:modsecurity:2.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.0:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.0:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.0:rc7:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.0:rc7:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.1:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.1:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.1:dev2:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.1:dev2:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.1:dev3:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.1:dev3:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.1:dev4:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.1:dev4:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.1:rc1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.1:rc1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.1:rc2:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.1:rc2:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.2:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.2:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.2:rc1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.2:rc1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.2:rc2:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.2:rc2:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.2:rc3:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.2:rc3:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.3:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.3:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.3:rc1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.3:rc1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.3:rc2:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.3:rc2:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.4:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.4:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.4:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.4:rc1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.4:rc1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.4:rc2:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.4:rc2:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.4:rc3:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.4:rc3:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.4:rc4:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.4:rc4:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.5:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.5:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.6:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.6:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.7:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.7:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.2.0:dev1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.2.0:dev1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.0:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.0:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.0:dev2:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.0:dev2:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.0:rc3:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.0:rc3:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.0:rc4:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.0:rc4:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.1:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.1:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.1:rc1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.1:rc1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.5:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.6:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.6:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.7:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.7:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.7:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.7:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.7:rc1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.7:rc1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.8:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.8:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.9:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.9:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.10:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.10:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.10:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.10:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.10:dev1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.10:dev1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.10:dev2:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.10:dev2:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.10:dev3:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.10:dev3:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.11:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.11:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.12:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.12:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.13:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.13:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.13:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.13:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.13:dev1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.13:dev1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.0:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.0:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.1:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.1:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.1:rc1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.1:rc1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.2:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.2:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.2:rc1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.2:rc1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.3:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.3:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.3:rc1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.3:rc1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.4:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.4:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.4:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.4:rc1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.4:rc1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.5:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.5:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.6:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.6:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.7:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.7:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.8:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.8:*:*:*:*:*:*:*
  • cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
    cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
  • cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
    cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
  • cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
    cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*
    cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 12-02-2021 - 17:29)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:P/A:N
refmap via4
confirm
fedora FEDORA-2012-18278
fulldisc 20121017 SEC Consult SA-20121017-0 :: ModSecurity multipart/invalid part ruleset bypass
misc https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20121017-0_mod_security_ruleset_bypass.txt
mlist [oss-security] 20121018 Re: CVE request: Fwd: [Full-disclosure] SEC Consult SA-20121017-0 :: ModSecurity multipart/invalid part ruleset bypass
suse
  • openSUSE-SU-2013:1331
  • openSUSE-SU-2013:1336
  • openSUSE-SU-2013:1342
Last major update 12-02-2021 - 17:29
Published 28-12-2012 - 11:48
Last modified 12-02-2021 - 17:29
Back to Top