CVE-2012-4528

mod_security2 <2.7.0 - Auth Bypass

Title source: llm
STIX 2.1

Description

The mod_security2 module before 2.7.0 for the Apache HTTP Server allows remote attackers to bypass rules, and deliver arbitrary POST data to a PHP application, via a multipart request in which an invalid part precedes the crafted data.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Bernhard Mueller · textremotelinux
https://www.exploit-db.com/exploits/37949

References (10)

Core 10
Core References
Mailing List, Third Party Advisory vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-updates/2013-08/msg00031.html
Mailing List, Third Party Advisory vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-updates/2013-08/msg00020.html
Exploit, Mailing List, Third Party Advisory mailing-list x_refsource_fulldisc
http://seclists.org/fulldisclosure/2012/Oct/113
Third Party Advisory vendor-advisory x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093011.html
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2012/10/18/14
Mailing List, Third Party Advisory vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-updates/2013-08/msg00025.html

Scores

EPSS 0.1146
EPSS Percentile 93.6%

Details

Status published
Products (5)
fedoraproject/fedora 18
opensuse/opensuse 11.4
opensuse/opensuse 12.2
opensuse/opensuse 12.3
trustwave/modsecurity < 2.7.0
Published Dec 28, 2012
Tracked Since Feb 18, 2026