Description
The mod_security2 module before 2.7.0 for the Apache HTTP Server allows remote attackers to bypass rules, and deliver arbitrary POST data to a PHP application, via a multipart request in which an invalid part precedes the crafted data.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Bernhard Mueller · textremotelinux
https://www.exploit-db.com/exploits/37949
References (10)
Core 10
Core References
Third Party Advisory x_refsource_misc
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20121017-0_mod_security_ruleset_bypass.txt
Mailing List, Third Party Advisory vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-updates/2013-08/msg00031.html
Broken Link x_refsource_confirm
http://mod-security.svn.sourceforge.net/viewvc/mod-security?view=revision&sortby=date&revision=2081
Mailing List, Third Party Advisory vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-updates/2013-08/msg00020.html
Broken Link x_refsource_confirm
http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/branches/2.7.x/CHANGES
Broken Link x_refsource_confirm
http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/trunk/apache2/msc_multipart.c?sortby=date&r1=2081&r2=2080&pathrev=2081
Exploit, Mailing List, Third Party Advisory mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2012/Oct/113
Third Party Advisory vendor-advisory
x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093011.html
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2012/10/18/14
Mailing List, Third Party Advisory vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-updates/2013-08/msg00025.html
Scores
EPSS
0.1146
EPSS Percentile
93.6%
Details
Status
published
Products (5)
fedoraproject/fedora
18
opensuse/opensuse
11.4
opensuse/opensuse
12.2
opensuse/opensuse
12.3
trustwave/modsecurity
< 2.7.0
Published
Dec 28, 2012
Tracked Since
Feb 18, 2026