4.3
CVSSv2

CVE-2012-2751

Published: 22/07/2012 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

ModSecurity prior to 2.6.6, when used with PHP, does not properly handle single quotes not at the beginning of a request parameter value in the Content-Disposition field of a request with a multipart/form-data Content-Type header, which allows remote malicious users to bypass filtering rules and perform other attacks such as cross-site scripting (XSS) attacks. NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-5031.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

trustwave modsecurity

opensuse opensuse 12.3

opensuse opensuse 11.4

opensuse opensuse 12.2

debian debian linux 7.0

debian debian linux 6.0

oracle http server 11.1.1.6.0

Vendor Advisories

Debian Bug report logs - #678527 [CVE-2012-2751] mod_security multi-part bypass Package: modsecurity-apache; Maintainer for modsecurity-apache is Alberto Gonzalez Iniesta <agi@inittaborg>; Reported by: Luciano Bello <luciano@debianorg> Date: Fri, 22 Jun 2012 13:27:01 UTC Severity: grave Tags: patch, security Fixed ...
Qualys Vulnerability & Malware Research Labs discovered a vulnerability in ModSecurity, a security module for the Apache webserver In situations where both Content:Disposition: attachment and Content-Type: multipart were present in HTTP headers, the vulnerability could allow an attacker to bypass policy and execute cross-site script (XSS) atta ...