Computer Security
[EN] securityvulns.ru no-pyccku


Apache mod_security protection bypass
Published:09.07.2012
Source:
SecurityVulns ID:12451
Type:library
Threat Level:
4/10
Description:It's possible to bypass protection if both Content-Disposition: attachment and Content-Type: multipart are present
Affected:APACHE : mod-security 2.6
CVE:CVE-2012-4528 (The mod_security2 module before 2.7.0 for the Apache HTTP Server allows remote attackers to bypass rules, and deliver arbitrary POST data to a PHP application, via a multipart request in which an invalid part precedes the crafted data.)
 CVE-2012-2751 (ModSecurity before 2.6.6, when used with PHP, does not properly handle single quotes not at the beginning of a request parameter value in the Content-Disposition field of a request with a multipart/form-data Content-Type header, which allows remote attackers to bypass filtering rules and perform other attacks such as cross-site scripting (XSS) attacks. NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-5031.)
Original documentdocumentDEBIAN, [SECURITY] [DSA 2506-1] libapache-mod-security security update (09.07.2012)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod