Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2012-4528
Description:The mod_security2 module before 2.7.0 for the Apache HTTP Server allows remote attackers to bypass rules, and deliver arbitrary POST data to a PHP application, via a multipart request in which an invalid part precedes the crafted data.
Test IDs: 1.3.6.1.4.1.25623.1.0.864903   1.3.6.1.4.1.25623.1.0.864904  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2012-4528
20121017 SEC Consult SA-20121017-0 :: ModSecurity multipart/invalid part ruleset bypass
http://seclists.org/fulldisclosure/2012/Oct/113
FEDORA-2012-18278
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/093011.html
[oss-security] 20121018 Re: CVE request: Fwd: [Full-disclosure] SEC Consult SA-20121017-0 :: ModSecurity multipart/invalid part ruleset bypass
http://www.openwall.com/lists/oss-security/2012/10/18/14
http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/branches/2.7.x/CHANGES
http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/branches/2.7.x/CHANGES
http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/trunk/apache2/msc_multipart.c?sortby=date&r1=2081&r2=2080&pathrev=2081
http://mod-security.svn.sourceforge.net/viewvc/mod-security/m2/trunk/apache2/msc_multipart.c?sortby=date&r1=2081&r2=2080&pathrev=2081
http://mod-security.svn.sourceforge.net/viewvc/mod-security?view=revision&sortby=date&revision=2081
http://mod-security.svn.sourceforge.net/viewvc/mod-security?view=revision&sortby=date&revision=2081
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20121017-0_mod_security_ruleset_bypass.txt
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20121017-0_mod_security_ruleset_bypass.txt
openSUSE-SU-2013:1331
http://lists.opensuse.org/opensuse-updates/2013-08/msg00020.html
openSUSE-SU-2013:1336
http://lists.opensuse.org/opensuse-updates/2013-08/msg00025.html
openSUSE-SU-2013:1342
http://lists.opensuse.org/opensuse-updates/2013-08/msg00031.html




© 1998-2025 E-Soft Inc. All rights reserved.