First published: Fri Dec 28 2012(Updated: )
The mod_security2 module before 2.7.0 for the Apache HTTP Server allows remote attackers to bypass rules, and deliver arbitrary POST data to a PHP application, via a multipart request in which an invalid part precedes the crafted data.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trustwave ModSecurity | <2.7.0 | |
openSUSE | =11.4 | |
openSUSE | =12.2 | |
openSUSE | =12.3 | |
Fedoraproject Fedora | =18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4528 has a moderate severity rating as it can allow remote attacks that bypass security rules.
You can mitigate CVE-2012-4528 by upgrading the mod_security2 module to version 2.7.0 or later.
CVE-2012-4528 affects versions of the mod_security2 module before 2.7.0 on various distributions including openSUSE and Fedora.
Yes, CVE-2012-4528 can lead to unauthorized delivery of arbitrary POST data, potentially exposing sensitive information.
While there have been reports of the vulnerability, active exploitation is not widely documented.