Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.831759
Categoría:Mandrake Local Security Checks
Título:Mandriva Update for apache-mod_security MDVSA-2012:182 (apache-mod_security)
Resumen:The remote host is missing an update for the 'apache-mod_security'; package(s) announced via the referenced advisory.
Descripción:Summary:
The remote host is missing an update for the 'apache-mod_security'
package(s) announced via the referenced advisory.

Vulnerability Insight:
Multiple vulnerabilities has been discovered and corrected in
apache-mod_security:

ModSecurity before 2.6.6, when used with PHP, does not properly handle
single quotes not at the beginning of a request parameter value in
the Content-Disposition field of a request with a multipart/form-data
Content-Type header, which allows remote attackers to bypass filtering
rules and perform other attacks such as cross-site scripting (XSS)
attacks. NOTE: this vulnerability exists because of an incomplete
fix for CVE-2009-5031 (CVE-2012-2751).

ModSecurity <= 2.6.8 is vulnerable to multipart/invalid part
ruleset bypass, this was fixed in 2.7.0 (released on2012-10-16)
(CVE-2012-4528).

The updated packages have been patched to correct these issues.

Affected Software/OS:
apache-mod_security on Mandriva Linux 2011.0

Solution:
Please Install the Updated Packages.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:N

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2009-5031
BugTraq ID: 54156
http://www.securityfocus.com/bid/54156
http://blog.ivanristic.com/2012/06/modsecurity-and-modsecurity-core-rule-set-multipart-bypasses.html
http://www.suspekt.org/downloads/POC2009-ShockingNewsInPHPExploitation.pdf
http://www.openwall.com/lists/oss-security/2012/06/22/2
http://www.openwall.com/lists/oss-security/2012/06/22/1
http://secunia.com/advisories/49576
SuSE Security Announcement: openSUSE-SU-2013:1331 (Google Search)
http://lists.opensuse.org/opensuse-updates/2013-08/msg00020.html
SuSE Security Announcement: openSUSE-SU-2013:1336 (Google Search)
http://lists.opensuse.org/opensuse-updates/2013-08/msg00025.html
SuSE Security Announcement: openSUSE-SU-2013:1342 (Google Search)
http://lists.opensuse.org/opensuse-updates/2013-08/msg00031.html
Common Vulnerability Exposure (CVE) ID: CVE-2012-2751
49576
49782
http://secunia.com/advisories/49782
54156
DSA-2506
http://www.debian.org/security/2012/dsa-2506
MDVSA-2012:118
http://www.mandriva.com/security/advisories?name=MDVSA-2012:118
MDVSA-2013:150
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
[oss-security] 20120621 Re: mod_security CVE request
[oss-security] 20120621 mod_security CVE request
http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/branches/2.6.x/CHANGES
http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/trunk/CHANGES?r1=1920&r2=1919&pathrev=1920
http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/trunk/apache2/msc_multipart.c?r1=1918&r2=1917&pathrev=1918
http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html
openSUSE-SU-2013:1331
openSUSE-SU-2013:1336
openSUSE-SU-2013:1342
Common Vulnerability Exposure (CVE) ID: CVE-2012-4528
20121017 SEC Consult SA-20121017-0 :: ModSecurity multipart/invalid part ruleset bypass
http://seclists.org/fulldisclosure/2012/Oct/113
FEDORA-2012-18278
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093011.html
[oss-security] 20121018 Re: CVE request: Fwd: [Full-disclosure] SEC Consult SA-20121017-0 :: ModSecurity multipart/invalid part ruleset bypass
http://www.openwall.com/lists/oss-security/2012/10/18/14
http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/branches/2.7.x/CHANGES
http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/trunk/apache2/msc_multipart.c?sortby=date&r1=2081&r2=2080&pathrev=2081
http://mod-security.svn.sourceforge.net/viewvc/mod-security?view=revision&sortby=date&revision=2081
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20121017-0_mod_security_ruleset_bypass.txt
CopyrightCopyright (C) 2012 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.