ID CVE-2012-2751
Summary ModSecurity before 2.6.6, when used with PHP, does not properly handle single quotes not at the beginning of a request parameter value in the Content-Disposition field of a request with a multipart/form-data Content-Type header, which allows remote attackers to bypass filtering rules and perform other attacks such as cross-site scripting (XSS) attacks. NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-5031.
References
Vulnerable Configurations
  • cpe:2.3:a:trustwave:modsecurity:2.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.0:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.0:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.0:rc7:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.0:rc7:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.1:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.1:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.1:dev2:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.1:dev2:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.1:dev3:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.1:dev3:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.1:dev4:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.1:dev4:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.1:rc1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.1:rc1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.1:rc2:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.1:rc2:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.2:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.2:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.2:rc1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.2:rc1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.2:rc2:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.2:rc2:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.2:rc3:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.2:rc3:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.3:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.3:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.3:rc1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.3:rc1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.3:rc2:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.3:rc2:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.4:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.4:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.4:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.4:rc1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.4:rc1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.4:rc2:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.4:rc2:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.4:rc3:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.4:rc3:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.4:rc4:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.4:rc4:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.5:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.5:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.6:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.6:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.1.7:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.1.7:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.2.0:dev1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.2.0:dev1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.0:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.0:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.0:dev2:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.0:dev2:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.0:rc3:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.0:rc3:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.0:rc4:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.0:rc4:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.1:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.1:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.1:rc1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.1:rc1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.5:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.6:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.6:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.7:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.7:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.7:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.7:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.7:rc1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.7:rc1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.8:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.8:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.9:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.9:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.10:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.10:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.10:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.10:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.10:dev1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.10:dev1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.10:dev2:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.10:dev2:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.10:dev3:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.10:dev3:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.11:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.11:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.12:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.12:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.13:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.13:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.13:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.13:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.5.13:dev1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.5.13:dev1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.0:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.0:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.1:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.1:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.1:rc1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.1:rc1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.2:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.2:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.2:rc1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.2:rc1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.3:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.3:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.3:rc1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.3:rc1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.4:*:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.4:-:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.4:-:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.4:rc1:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.4:rc1:*:*:*:*:*:*
  • cpe:2.3:a:trustwave:modsecurity:2.6.5:*:*:*:*:*:*:*
    cpe:2.3:a:trustwave:modsecurity:2.6.5:*:*:*:*:*:*:*
  • cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
    cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
  • cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
    cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
  • cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
    cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:http_server:11.1.1.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:http_server:11.1.1.6.0:*:*:*:*:*:*:*
CVSS
Base: 4.3 (as of 13-02-2023 - 00:25)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:M/Au:N/C:N/I:P/A:N
refmap via4
bid 54156
confirm
debian DSA-2506
mandriva
  • MDVSA-2012:118
  • MDVSA-2013:150
misc http://blog.ivanristic.com/2012/06/modsecurity-and-modsecurity-core-rule-set-multipart-bypasses.html
mlist
  • [oss-security] 20120621 Re: mod_security CVE request
  • [oss-security] 20120621 mod_security CVE request
secunia
  • 49576
  • 49782
suse
  • openSUSE-SU-2013:1331
  • openSUSE-SU-2013:1336
  • openSUSE-SU-2013:1342
Last major update 13-02-2023 - 00:25
Published 22-07-2012 - 16:55
Last modified 13-02-2023 - 00:25
Back to Top