First published: Wed Apr 03 2013(Updated: )
It was reported that the XML files parser of ModSecurity, a security module for the Apache HTTP Server, was vulnerable to XML External Entity attacks. A remote attacker could provide a specially-crafted XML file that, when processed might lead to local files disclosure or, potentially, excessive resources (memory, CPU) consumption. References: [1] <a href="https://bugs.gentoo.org/show_bug.cgi?id=464188">https://bugs.gentoo.org/show_bug.cgi?id=464188</a> [2] <a href="https://secunia.com/advisories/52847/">https://secunia.com/advisories/52847/</a> [3] <a href="https://github.com/SpiderLabs/ModSecurity/blob/master/CHANGES">https://github.com/SpiderLabs/ModSecurity/blob/master/CHANGES</a> Relevant upstream patch: [4] <a href="https://github.com/SpiderLabs/ModSecurity/commit/d4d80b38aa85eccb26e3c61b04d16e8ca5de76fe">https://github.com/SpiderLabs/ModSecurity/commit/d4d80b38aa85eccb26e3c61b04d16e8ca5de76fe</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ModSecurity | <2.7.3 | 2.7.3 |
Trustwave ModSecurity | <2.7.3 | |
openSUSE openSUSE | =11.4 | |
openSUSE openSUSE | =12.2 | |
openSUSE openSUSE | =12.3 | |
Fedoraproject Fedora | =17 | |
Fedoraproject Fedora | =18 | |
Fedoraproject Fedora | =19 | |
Debian Debian Linux | =6.0 | |
Debian Debian Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.