Vulnerability Details CVE-2012-2751
ModSecurity before 2.6.6, when used with PHP, does not properly handle single quotes not at the beginning of a request parameter value in the Content-Disposition field of a request with a multipart/form-data Content-Type header, which allows remote attackers to bypass filtering rules and perform other attacks such as cross-site scripting (XSS) attacks. NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-5031.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.032
EPSS Ranking 86.3%
CVSS Severity
CVSS v2 Score 4.3
Products affected by CVE-2012-2751
-
cpe:2.3:a:oracle:http_server:11.1.1.6.0
-
cpe:2.3:a:trustwave:modsecurity:2.0.0
-
cpe:2.3:a:trustwave:modsecurity:2.0.1
-
cpe:2.3:a:trustwave:modsecurity:2.0.2
-
cpe:2.3:a:trustwave:modsecurity:2.0.3
-
cpe:2.3:a:trustwave:modsecurity:2.0.4
-
cpe:2.3:a:trustwave:modsecurity:2.1.0
-
cpe:2.3:a:trustwave:modsecurity:2.1.1
-
cpe:2.3:a:trustwave:modsecurity:2.1.2
-
cpe:2.3:a:trustwave:modsecurity:2.1.3
-
cpe:2.3:a:trustwave:modsecurity:2.1.4
-
cpe:2.3:a:trustwave:modsecurity:2.1.5
-
cpe:2.3:a:trustwave:modsecurity:2.1.6
-
cpe:2.3:a:trustwave:modsecurity:2.1.7
-
cpe:2.3:a:trustwave:modsecurity:2.2.0
-
cpe:2.3:a:trustwave:modsecurity:2.5.0
-
cpe:2.3:a:trustwave:modsecurity:2.5.1
-
cpe:2.3:a:trustwave:modsecurity:2.5.10
-
cpe:2.3:a:trustwave:modsecurity:2.5.11
-
cpe:2.3:a:trustwave:modsecurity:2.5.12
-
cpe:2.3:a:trustwave:modsecurity:2.5.13
-
cpe:2.3:a:trustwave:modsecurity:2.5.2
-
cpe:2.3:a:trustwave:modsecurity:2.5.3
-
cpe:2.3:a:trustwave:modsecurity:2.5.4
-
cpe:2.3:a:trustwave:modsecurity:2.5.5
-
cpe:2.3:a:trustwave:modsecurity:2.5.6
-
cpe:2.3:a:trustwave:modsecurity:2.5.7
-
cpe:2.3:a:trustwave:modsecurity:2.5.8
-
cpe:2.3:a:trustwave:modsecurity:2.5.9
-
cpe:2.3:a:trustwave:modsecurity:2.6.0
-
cpe:2.3:a:trustwave:modsecurity:2.6.1
-
cpe:2.3:a:trustwave:modsecurity:2.6.2
-
cpe:2.3:a:trustwave:modsecurity:2.6.3
-
cpe:2.3:a:trustwave:modsecurity:2.6.4
-
cpe:2.3:a:trustwave:modsecurity:2.6.5
-
cpe:2.3:o:debian:debian_linux:6.0
-
cpe:2.3:o:debian:debian_linux:7.0
-
cpe:2.3:o:opensuse:opensuse:11.4
-
cpe:2.3:o:opensuse:opensuse:12.2
-
cpe:2.3:o:opensuse:opensuse:12.3