Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2012-2751

Опубликовано: 22 июл. 2012
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.3

Описание

ModSecurity before 2.6.6, when used with PHP, does not properly handle single quotes not at the beginning of a request parameter value in the Content-Disposition field of a request with a multipart/form-data Content-Type header, which allows remote attackers to bypass filtering rules and perform other attacks such as cross-site scripting (XSS) attacks. NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-5031.

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

hardy

DNE

lucid

released

2.5.11-1ubuntu0.1
natty

released

2.5.12-1+squeeze1build0.11.04.1
oneiric

released

2.5.12-1+squeeze1build0.11.10.1
precise

DNE

precise/esm

DNE

quantal

DNE

raring

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

2.6.6-1
esm-apps/xenial

not-affected

2.6.6-1
esm-infra-legacy/trusty

not-affected

2.6.6-1
hardy

DNE

lucid

DNE

natty

DNE

oneiric

ignored

end of life
precise

ignored

end of life
precise/esm

DNE

precise was needed
quantal

not-affected

2.6.6-1

Показывать по

EPSS

Процентиль: 83%
0.01943
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

nvd
больше 13 лет назад

ModSecurity before 2.6.6, when used with PHP, does not properly handle single quotes not at the beginning of a request parameter value in the Content-Disposition field of a request with a multipart/form-data Content-Type header, which allows remote attackers to bypass filtering rules and perform other attacks such as cross-site scripting (XSS) attacks. NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-5031.

debian
больше 13 лет назад

ModSecurity before 2.6.6, when used with PHP, does not properly handle ...

github
больше 3 лет назад

ModSecurity before 2.6.6, when used with PHP, does not properly handle single quotes not at the beginning of a request parameter value in the Content-Disposition field of a request with a multipart/form-data Content-Type header, which allows remote attackers to bypass filtering rules and perform other attacks such as cross-site scripting (XSS) attacks. NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-5031.

EPSS

Процентиль: 83%
0.01943
Низкий

4.3 Medium

CVSS2