[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2009-5031Date: (C)2012-07-22   (M)2023-12-22


ModSecurity before 2.5.11 treats request parameter values containing single quotes as files, which allows remote attackers to bypass filtering rules and perform other attacks such as cross-site scripting (XSS) attacks via a single quote in a request parameter in the Content-Disposition field of a request with a multipart/form-data Content-Type header.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 4.3
Exploit Score: 8.6
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: NONE
Integrity: PARTIAL
Availability: NONE
  
Reference:
SECUNIA-49576
BID-54156
http://www.openwall.com/lists/oss-security/2012/06/22/2
http://www.openwall.com/lists/oss-security/2012/06/22/1
http://blog.ivanristic.com/2012/06/modsecurity-and-modsecurity-core-rule-set-multipart-bypasses.html
http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/branches/2.6.x/CHANGES
http://www.suspekt.org/downloads/POC2009-ShockingNewsInPHPExploitation.pdf
https://www.modsecurity.org/fisheye/browse/modsecurity/m2/branches/2.5.x/apache2/msc_multipart.c?r2=1419&r1=1366
openSUSE-SU-2013:1331
openSUSE-SU-2013:1336
openSUSE-SU-2013:1342

CPE    3
cpe:/o:opensuse:opensuse:12.2
cpe:/o:opensuse:opensuse:12.3
cpe:/o:opensuse:opensuse:11.4
CWE    1
CWE-79
OVAL    1
oval:org.secpod.oval:def:302987

© SecPod Technologies