SB2012072210 - Input validation error in Trustwave ModSecurity
Published: July 22, 2012 Updated: August 11, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Input validation error (CVE-ID: CVE-2009-5031)
The vulnerability allows a remote non-authenticated attacker to manipulate data.
ModSecurity before 2.5.11 treats request parameter values containing single quotes as files, which allows remote attackers to bypass filtering rules and perform other attacks such as cross-site scripting (XSS) attacks via a single quote in a request parameter in the Content-Disposition field of a request with a multipart/form-data Content-Type header.
Remediation
Install update from vendor's website.
References
- http://blog.ivanristic.com/2012/06/modsecurity-and-modsecurity-core-rule-set-multipart-bypasses.html
- http://lists.opensuse.org/opensuse-updates/2013-08/msg00020.html
- http://lists.opensuse.org/opensuse-updates/2013-08/msg00025.html
- http://lists.opensuse.org/opensuse-updates/2013-08/msg00031.html
- http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/branches/2.6.x/CHANGES
- http://secunia.com/advisories/49576
- http://www.openwall.com/lists/oss-security/2012/06/22/1
- http://www.openwall.com/lists/oss-security/2012/06/22/2
- http://www.securityfocus.com/bid/54156
- http://www.suspekt.org/downloads/POC2009-ShockingNewsInPHPExploitation.pdf
- https://www.modsecurity.org/fisheye/browse/modsecurity/m2/branches/2.5.x/apache2/msc_multipart.c?r2=1419&r1=1366