ID CVE-2013-1915
Summary ModSecurity before 2.7.3 allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via an XML external entity declaration in conjunction with an entity reference, aka an XML External Entity (XXE) vulnerability.
References
Vulnerable Configurations
  • cpe:2.3:a:trustwave:modsecurity:2.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.0:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.0:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.0:rc7:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.0:rc7:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.1:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.1:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.1:dev2:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.1:dev2:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.1:dev3:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.1:dev3:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.1:dev4:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.1:dev4:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.1:rc1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.1:rc1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.1:rc2:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.1:rc2:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.2:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.2:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.2:rc1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.2:rc1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.2:rc2:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.2:rc2:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.2:rc3:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.2:rc3:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.3:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.3:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.3:rc1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.3:rc1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.3:rc2:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.3:rc2:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.4:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.4:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.4:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.4:rc1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.4:rc1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.4:rc2:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.4:rc2:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.4:rc3:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.4:rc3:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.4:rc4:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.4:rc4:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.5:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.5:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.6:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.6:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.7:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.7:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.2.0:dev1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.2.0:dev1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.0:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.0:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.0:dev2:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.0:dev2:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.0:rc3:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.0:rc3:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.0:rc4:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.0:rc4:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.1:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.1:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.1:rc1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.1:rc1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.5:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.6:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.6:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.7:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.7:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.7:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.7:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.7:rc1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.7:rc1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.8:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.8:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.9:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.9:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.10:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.10:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.10:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.10:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.10:dev1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.10:dev1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.10:dev2:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.10:dev2:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.10:dev3:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.10:dev3:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.11:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.11:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.12:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.12:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.13:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.13:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.13:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.13:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.13:dev1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.13:dev1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.0:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.0:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.1:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.1:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.1:rc1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.1:rc1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.2:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.2:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.2:rc1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.2:rc1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.3:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.3:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.3:rc1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.3:rc1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.4:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.4:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.4:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.4:rc1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.4:rc1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.5:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.5:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.6:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.6:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.7:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.7:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.8:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.8:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.7.0:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.7.0:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.7.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.7.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.7.0:rc3:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.7.0:rc3:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.7.2:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.7.2:*:*:*:*:*:*:*
  • cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
    cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
  • cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
    cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
  • cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
    cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*
    cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*
    cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
    cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 12-02-2021 - 17:27)
Impact:
Exploitability:
CWE CWE-611
CAPEC
  • XML External Entities Blowup
    This attack takes advantage of the entity replacement property of XML where the value of the replacement is a URI. A well-crafted XML document could have the entity refer to a URI that consumes a large amount of resources to create a denial of service condition. This can cause the system to either freeze, crash, or execute arbitrary code depending on the URI.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 58810
confirm
debian DSA-2659
fedora
  • FEDORA-2013-4831
  • FEDORA-2013-4834
  • FEDORA-2013-4908
mandriva MDVSA-2013:156
misc https://bugzilla.redhat.com/show_bug.cgi?id=947842
mlist [oss-security] 20130403 Re: CVE Request -- ModSecurity (X < 2.7.3): Vulnerable to XXE attacks
secunia
  • 52847
  • 52977
suse
  • openSUSE-SU-2013:1331
  • openSUSE-SU-2013:1336
  • openSUSE-SU-2013:1342
Last major update 12-02-2021 - 17:27
Published 25-04-2013 - 23:55
Last modified 12-02-2021 - 17:27
Back to Top