CVE-2012-2751

ModSecurity before 2.6.6, when used with PHP, does not properly handle single quotes not at the beginning of a request parameter value in the Content-Disposition field of a request with a multipart/form-data Content-Type header, which allows remote attackers to bypass filtering rules and perform other attacks such as cross-site scripting (XSS) attacks.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-5031.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.3 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 86%
VendorProductVersion
trustwavemodsecurity
𝑥
< 2.6.6
opensuseopensuse
11.4
opensuseopensuse
12.2
opensuseopensuse
12.3
debiandebian_linux
6.0
debiandebian_linux
7.0
oraclehttp_server
11.1.1.6.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
modsecurity-apache
bullseye
2.9.3-3+deb11u2
fixed
bullseye (security)
2.9.3-3+deb11u1
fixed
bookworm
2.9.7-1
fixed
sid
2.9.8-1
fixed
trixie
2.9.8-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libapache-mod-security
zesty
dne
yakkety
dne
xenial
dne
wily
dne
vivid
dne
utopic
dne
trusty
dne
saucy
dne
raring
dne
quantal
dne
precise
dne
oneiric
Fixed 2.5.12-1+squeeze1build0.11.10.1
released
natty
Fixed 2.5.12-1+squeeze1build0.11.04.1
released
lucid
Fixed 2.5.11-1ubuntu0.1
released
hardy
dne
modsecurity-apache
zesty
not-affected
yakkety
not-affected
xenial
not-affected
wily
not-affected
vivid
not-affected
utopic
not-affected
trusty
not-affected
saucy
not-affected
raring
not-affected
quantal
not-affected
precise
ignored
oneiric
ignored
natty
dne
lucid
dne
hardy
dne
References