#VU43809 Input validation error in ModSecurity - CVE-2009-5031
Published: July 22, 2012 / Updated: August 11, 2020
ModSecurity
Trustwave
Description
The vulnerability allows a remote non-authenticated attacker to manipulate data.
ModSecurity before 2.5.11 treats request parameter values containing single quotes as files, which allows remote attackers to bypass filtering rules and perform other attacks such as cross-site scripting (XSS) attacks via a single quote in a request parameter in the Content-Disposition field of a request with a multipart/form-data Content-Type header.
Remediation
External links
- http://blog.ivanristic.com/2012/06/modsecurity-and-modsecurity-core-rule-set-multipart-bypasses.html
- http://lists.opensuse.org/opensuse-updates/2013-08/msg00020.html
- http://lists.opensuse.org/opensuse-updates/2013-08/msg00025.html
- http://lists.opensuse.org/opensuse-updates/2013-08/msg00031.html
- http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/branches/2.6.x/CHANGES
- http://secunia.com/advisories/49576
- http://www.openwall.com/lists/oss-security/2012/06/22/1
- http://www.openwall.com/lists/oss-security/2012/06/22/2
- http://www.securityfocus.com/bid/54156
- http://www.suspekt.org/downloads/POC2009-ShockingNewsInPHPExploitation.pdf
- https://www.modsecurity.org/fisheye/browse/modsecurity/m2/branches/2.5.x/apache2/msc_multipart.c?r2=1419&r1=1366