5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
6.6 Medium
AI Score
Confidence
Low
0.013 Low
EPSS
Percentile
85.7%
The mod_security2 module before 2.7.0 for the Apache HTTP Server allows remote attackers to bypass rules, and deliver arbitrary POST data to a PHP application, via a multipart request in which an invalid part precedes the crafted data.
CPE | Name | Operator | Version |
---|---|---|---|
trustwave:modsecurity | trustwave modsecurity | lt | 2.7.0 |
lists.fedoraproject.org/pipermail/package-announce/2012-November/093011.html
lists.opensuse.org/opensuse-updates/2013-08/msg00020.html
lists.opensuse.org/opensuse-updates/2013-08/msg00025.html
lists.opensuse.org/opensuse-updates/2013-08/msg00031.html
mod-security.svn.sourceforge.net/viewvc/mod-security/m2/branches/2.7.x/CHANGES
mod-security.svn.sourceforge.net/viewvc/mod-security/m2/trunk/apache2/msc_multipart.c?sortby=date&r1=2081&r2=2080&pathrev=2081
mod-security.svn.sourceforge.net/viewvc/mod-security?view=revision&sortby=date&revision=2081
seclists.org/fulldisclosure/2012/Oct/113
www.openwall.com/lists/oss-security/2012/10/18/14
www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20121017-0_mod_security_ruleset_bypass.txt