6.8
CVSSv2

CVE-2007-1359

Published: 08/03/2007 Updated: 29/07/2017
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 685
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Interpretation conflict in ModSecurity (mod_security) 2.1.0 and previous versions allows remote malicious users to bypass request rules via application/x-www-form-urlencoded POST data that contains an ASCIIZ (0x00) byte, which mod_security treats as a terminator even though it is still processed as normal data by some HTTP parsers including PHP 5.2.0, and possibly parsers in Perl, and Python.

Vulnerable Product Search on Vulmon Subscribe to Product

mod security mod security 1.7.4

mod security mod security 1.7.5

mod security mod security 1.7.1

mod security mod security 1.7.2

mod security mod security 1.9.4

mod security mod security 2.1

mod security mod security 1.7

Exploits

mod_security <= 210 (ASCIIZ byte) POST Rules Bypass Vulnerability wwwphp-securityorg/MOPB/BONUS-12-2007html Affected is mod_security <= 210 Detailed information Detailed information When mod_security receives a request it parses it into web application parameters in a way it believes is correct Because the way it parses ...