CVE-2009-5031

NameCVE-2009-5031
DescriptionModSecurity before 2.5.11 treats request parameter values containing single quotes as files, which allows remote attackers to bypass filtering rules and perform other attacks such as cross-site scripting (XSS) attacks via a single quote in a request parameter in the Content-Disposition field of a request with a multipart/form-data Content-Type header.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
modsecurity-apache (PTS)buster, buster (security)2.9.3-1+deb10u1fixed
bullseye (security), bullseye2.9.3-3+deb11u1fixed
bookworm, sid2.9.6-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libapache-mod-securitysource(unstable)2.5.12-1
modsecurity-apachesource(unstable)(not affected)

Notes

- modsecurity-apache <not-affected> (Fixed before initial upload)
https://www.modsecurity.org/fisheye/browse/modsecurity/m2/branches/2.5.x/apache2/msc_multipart.c?r2=1419&r1=1366
https://www.openwall.com/lists/oss-security/2012/06/22/1
https://www.openwall.com/lists/oss-security/2012/06/22/2

Search for package or bug name: Reporting problems